Have a personal or library account? Click to login
A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID Cover

A Prevention Model for Session Hijack Attacks in Wireless Networks Using Strong and Encrypted Session ID

Open Access
|Nov 2014

References

  1. 1. Alex, Chin Huang, Mohamed. A Secure Cookie Protocol. - In: Proc. of IEEE Conference on Network Security, 2007, 333-338.
  2. 2. Chomsiri. HTTPS Hacking Protection. - In: Proc. of IEEE International Conference on Advanced Information Networking and Applications, 2007, 42-47.10.1109/AINAW.2007.200
  3. 3. Miyazaki, A. D. Online Privacy and the Disclosure of Cookie Use: Effects on Consumer Trust and Anticipated Patronage. - American Marketing Association, Vol. 27, 2008, No 1, 19-33.10.1509/jppm.27.1.19
  4. 4. Adida, B. Session Lock: Securing Web Sessions Against Eavesdropping. - In: Proc. of International Conference on Web Client Security, China, 2008, 517-524.
  5. 5. Jackson, C., A. Barth. Force HTTPS: Protecting High Security Websites from Network Attacks. - In: Proc. of International Conference on Web Client Security, China, 2008, 536-552.
  6. 6. Juels, A., T. Markus. Cache Cookies for Browser Authentication. - In: Proc. of IEEE International Conference on Security and Privacy, 2008.
  7. 7. Christopher, Kirda. Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities. - In: Proc. of IEEE International Conference on Security, 2009.
  8. 8. Howard, M. Man-in-the Middle Attack to the HTTPS Protocol. - In: Proc. of IEEE Securiry and Privacy, 2009, 78-81.10.1109/MSP.2009.12
  9. 9. Gaw, S., E. W. Felten. Password Management Strategies for Online Accounts. - In: Proc. of International Symposium on Usable Privacy and Security (SOUPS), Pittsburgh, USA, 2006, 44-55.10.1145/1143120.1143127
  10. 10. Ritchie, P. The Security Risks of AJAX / Web 2.0 Applications. Network Security, Secure Test, Ltd., UK, 2007.10.1016/S1353-4858(07)70025-9
  11. 11. Barth, A., C. Jackson, J. Mitchell. Robust Defenses for Cross Sire Request Forgery. - In: Proc. of ACM International Conference on CCS’08, Virginia, USA, 2008, 75-87.10.1145/1455770.1455782
  12. 12. Adida, B. Session Lock:Securing Web Sessions Against Eavesdropping. - In: Proc. of International World Wide Web Conference Committee (IW3C2), ACM, Beijing, China, 2008, 517-524.
  13. 13. Wang, F., Y. Zhang. A New Provably Secure Authentication and Key Agreement Mechanisms for SIP Using Certificate Less Public Key Cryptography. 2008, 1-15.10.1109/CIS.2007.113
  14. 14. Perdisci, R., D. Ariu, P. Giacinto, W. Lee. McPAD: A Multiple Classifier System for Accurate Payload Based Anomaly Detection. - Journal of Computer Networks, Vol. 53, 2009, No 6, 864-881.10.1016/j.comnet.2008.11.011
  15. 15. Eisen, O. Catching the Fraudlent Man-in-the-Middle and Main-in-the-Browser. - Network Security, 2010, No 4, 11-12.10.1016/S1353-4858(10)70046-5
  16. 16. Liao, Yi-Pin, S. S. Wang. A New Secure Password Authenticated Key Agreement Scheme for SIP Using Self Certified Public Keys on Elliptic Curves. - Journal of Computer Communications, Vol. 33, 2010, No 3, 372-380.10.1016/j.comcom.2009.10.005
  17. 17. Cichon, J., Z. Golebiewski, M. Kutylowski. From Key Pre-Distribution to Key Redistribution. - Journal of Theoretical Computer Science, Vol. 45, 2012, No 3, 75-87.10.1016/j.tcs.2012.06.001
  18. 18. Carbone, A. R., L. Compagna, J. Gincarlo, Sorniotti. An Authenication Flaw in Browser Based Single Sign on Protocols: Impact and Remediations. - Journal of Computers and Security, Vol. 33, 2012, 41-58.10.1016/j.cose.2012.08.007
  19. 19. Bielova, N. Survey on Java Script Security Policies and Their Enforcement Mechanisms in a Web Browser. - Journal of Logic and Algebraic Programming, Available Online from May 2013.10.1016/j.jlap.2013.05.001
  20. 20. Xiang, Y., X. Shi, J. Wu, Z. Wang, X. Yin. Sign What You Really Care about Secure BGP AS-Paths Efficiently. - Journal of Computer Networks, Vol. 57, 2013, No 10, 2250-2265.10.1016/j.comnet.2012.11.019
  21. 21. Dokev, N., I.Blagoev. An Approach for Automatic Transmission of Authenticated Data over Computer Networks. - Cybernetics and Information Technologies, Vol. 11, 2011, No 2, 65-82.
  22. 22. Pencheva, E., I. Atanasov. Open Access to Call and Session Control in Mobile Networks. - Cybernetics and Information Technologies, Vol. 10, 2010, No 1, 49-63.
DOI: https://doi.org/10.2478/cait-2014-0032 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 46 - 60
Published on: Nov 5, 2014
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2014 S. S. Manivannan, E. Sathiyamoorthy, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.