Security problems in the TCP/IP protocol suite
ACM SIGCOMM Computer Communication Review
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
Jamming and sensing of encrypted wireless ad hoc networks
Proceedings of the 7th ACM international symposium on Mobile ad hoc networking and computing
Continuous Verification Using Multimodal Biometrics
IEEE Transactions on Pattern Analysis and Machine Intelligence
Cget, Cput, and stage: safe file transport tools for the internet
ATEC '97 Proceedings of the annual conference on USENIX Annual Technical Conference
Application-based TCP hijacking
Proceedings of the Second European Workshop on System Security
ROFL: routing as the firewall layer
Proceedings of the 2008 workshop on New security paradigms
The case for ubiquitous transport-level encryption
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Continuous verification using multimodal biometrics
ICB'06 Proceedings of the 2006 international conference on Advances in Biometrics
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Review: TCP/IP security threats and attack methods
Computer Communications
Security architecture testing using IDS-a case study
Computer Communications
Collaborative TCP sequence number inference attack: how to crack sequence number under a second
Proceedings of the 2012 ACM conference on Computer and communications security
Hi-index | 0.00 |
This paper describes an active attack against the Transport Control Protocol (TCP) which allows a cracker to redirect the TCP stream through his machine thereby permitting him to bypass the protection offered by such a system as a one-time password [SKEY] or ticketing authentication [Kerberos]. The TCP connection is vulnerable to anyone with a TCP packet sniffer and generator located on the path followed by the connection. Some schemes to detect this attack are presented as well as some methods of prevention and some interesting details of the TCP protocol behaviors.