Open Access   Article Go Back

Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols

B.Aravind 1 , D Murugan2

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-08 , Page no. 66-70, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si8.6670

Online published on Apr 10, 2019

Copyright © B.Aravind, D Murugan . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B.Aravind, D Murugan, “Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.08, pp.66-70, 2019.

MLA Style Citation: B.Aravind, D Murugan "Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols." International Journal of Computer Sciences and Engineering 07.08 (2019): 66-70.

APA Style Citation: B.Aravind, D Murugan, (2019). Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols. International Journal of Computer Sciences and Engineering, 07(08), 66-70.

BibTex Style Citation:
@article{Murugan_2019,
author = {B.Aravind, D Murugan},
title = {Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {07},
Issue = {08},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {66-70},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=918},
doi = {https://doi.org/10.26438/ijcse/v7i8.6670}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i8.6670}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=918
TI - Hijacking Spoofing Attack and Defence Strategy Based on Secured Network Protocols
T2 - International Journal of Computer Sciences and Engineering
AU - B.Aravind, D Murugan
PY - 2019
DA - 2019/04/10
PB - IJCSE, Indore, INDIA
SP - 66-70
IS - 08
VL - 07
SN - 2347-2693
ER -

           

Abstract

Spoofing and Hijacking is a major threat in network security. Spoofing involves attacks that which are associated with the impersonation of third party to steal the credential information’s from a network. Major IP spoofing attacks includes ARP spoofing attacks and DNS spoofing attack, which targets the server. This attack is also called as IP address forging which tries to take away the major information’s from the organizations network systems. There are several tools available to prevent this intrusion prevention system. Some of them are snort, suricata, firewall, netfilter and IPfilter.Penetrating into the network can be prevented using be found using some testing tools like Nmap, Netcat and Hping. Certain attacks denial of service attack and man in the middle attack are more prone to these penetrating malicious threats. Therefore, it is mandatory to take necessary actions to prevent network from these attacks. Defensive strategies like filtering the packets, using an upper layer, using access control list and using a router that is encrypted in nature are encouraged to make the network secure. In this paper, various hijacking spoofing attack is analyzed and their preventive methods are mentioned to enable the network to be well secured. Certain specific protocols are encouraged to do this security measure to prevent the network attacks.

Key-Words / Index Term

hijacking,spoofing,blindspoofing,zombie,cookie,ferret,wireshark

References

[1] Abdullah H. Alqahtani, Mohsin Iftikhar,”International Journal of Science and Modern Engineering”, Volume-1, Issue-10, September 2013.
[2] Saurabh Jha, Shabir Ali, “Mobile Agent Based Architecture to Prevent Session Hijacking Attacks in IEEE 802.11 WLAN” International Conference on Computer and Communication Technology,2014.
[3] Vanajakshi, Srikanth Prabhu, ”An Effective Method for Preventing SQL Injection Attack and Session Hijacking” IEEE International Conference On Recent Trends in Electronics Information & Communication Technology 2017.
[4] Nitin Anand, Anil Sharma, “Ferret: A Host Vulnerability Checking Tool”, Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing, 2004.
[5] Matin Tamizi, Matt Weinstein, “Automated Checking for Windows Host Vulnerabilities”, Proceedings of the 16th IEEE International Symposium on Software Reliability Engineering.
[6] Resul Das, Gurkan Tuna,”Packet Tracing and Analysis of Network Cameras with Wireshark”,IEEE,2017.
[7] Shaoqiang Wang, DongSheng Xu,“Analysis and Application of Wireshark in TCP/IP Protocol Teaching”,International Conference on E-Health Networking, Digital Ecosystems and Technologies, IEEE 2010.
[8] Auttapon Pomsathit, “Effective of Unicast And Multicast IP Address Attack Over Intrusion Detection System with Honeypot” U.S. Government work not protected by U.S. copyright.
[9] Pooja Sharma, Sanjeev Kumar, “BotMAD: Botnet Malicious Activity Detector Based on DNS Traffic Analysis”, 2nd International Conference on Next Generation Computing Technologies, 2016.
[10] Zhenhai Duan, Peng Chen, Fernando Sanchez, “Detecting Spam Zombies by Monitoring Outgoing Messages”,IEEE.
[11] Thawatchai Chomsiri, “Sniffing Packets on LAN without ARP Spoofing” Third 2008 International Conference on Convergence and Hybrid Information Technology,472-477.
[12] S .Raguvaran,“Spoofing Attack: Preventing in Wireless Networks” International Conference on Communication and Signal Processing, April 3-5, 2014,117-121.
[13] Nikhil Tripathi, “Neminath Hubballi Exploiting DHCP Server-side IP Address Conflict Detection: A DHCP Starvation Attack”.
[14] Yongle Wang/s, JunZHang CHen/s,” Hijacking spoofing attack and defense strategy based on Internet TCP sessions”, 2013 IEEE 2nd International Symposium on Instrumentation and Measurement, Sensor Network and Automation,507-509.
[15] Enos LETSOALO, Prof Sunday OJO,“Session Hijacking Attacks in Wireless Networks: A Review of Existing Mitigation Techniques” IIMC International Information Management Corporation, 2017.
[16] Jeffrey Cashion and Mostafa Bassiouni “Protocol for Mitigating the Risk of Hijacking Social Networking Sites” International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Orlando, Florida, USA, October 15-18,2017.
[17] Veysel Harun “TOPOLOGY DISCOVERY OF PROFINET NETWORKS USING WIRESHARK” 2013 IEEE.
[18] Pedro R. M. In´acio, Paulo P. Monteiro,” Zombie Identification Port” The Third International Conference on Internet Monitoring and Protection,67-73.
[19] Zhenhai Duan, Peng Chen, Fernando Sanchez,”Detecting Spam Zombies by Monitoring Outgoing Messages”, IEEE INFOCOM 2009 proceedings.
[20] Feng Luo, “Method and Implementation of Building ForCES Protocol Dissector Based on Wireshark” 2010 IEEE.