@article{ART002234287},
author={Jae Yeong Choi and Baek Hyun Chul and PARK JAE HEUNG and KimSangBok},
title={The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis},
journal={Journal of Knowledge Information Technology and Systems},
issn={1975-7700},
year={2017},
volume={12},
number={3},
pages={439-446},
doi={10.34163/jkits.2017.12.3.006}
TY - JOUR
AU - Jae Yeong Choi
AU - Baek Hyun Chul
AU - PARK JAE HEUNG
AU - KimSangBok
TI - The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis
JO - Journal of Knowledge Information Technology and Systems
PY - 2017
VL - 12
IS - 3
PB - Korea Knowledge Information Technology Society
SP - 439
EP - 446
SN - 1975-7700
AB - At present, our society requires fast and accurate information in various fields, and shares information collected and processed through various devices existing around us. However, in the process of collecting, establishing and providing this information, the number of cases of illegal access to important information about person, country or company sharply increases. These cases of illegal access cause enormous damage to person, country or company. Illegal access to information may occur diversely, and in case an attack occurs, the situation is that a sniffing attack, which regular users cannot perceive, aggravates material/psychological damage to the corresponding company or person who gets damaged. Besides, with regard to a session hijacking attack making an illegal access attempt to actively steal information after attackers themselves pretending to be true sender/receiver in the process of sniffing, the situation is that damage gets worse. Nowadays, in the environment where each individual person has various devices that enables networking, the number of these attack techniques continue to increase. This paper analyzes whether RST signal is generated, which is needed for session reconnection and traffic information between users so as to make it possible to take countermeasures against sniffing and session hijacking attack. In the process of session hijacking, a regular user session is temporarily interrupted by generating RST signal inevitably. And this paper analyses whether this RST signal is generated. Besides, traffic information is analyzed because, in case a sniffing attack using ARP redirect or ICMP redirect occurs, the previous path changes, which may show deviation from traffic information in the ordinary path. This paper designed a model for countermeasures enabling proper and stable service against sniffing and session hijacking and it was made possible to be applied to the detection of attack that may occur diversely in the future on the basis of these data for analysis.
KW - TCP 3-Way;Session Hijacking;Sniffing;ARP Spoofing;ICMP Redirect
DO - 10.34163/jkits.2017.12.3.006
ER -
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG and KimSangBok. (2017). The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis. Journal of Knowledge Information Technology and Systems, 12(3), 439-446.
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG and KimSangBok. 2017, "The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis", Journal of Knowledge Information Technology and Systems, vol.12, no.3 pp.439-446. Available from: doi:10.34163/jkits.2017.12.3.006
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG, KimSangBok "The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis" Journal of Knowledge Information Technology and Systems 12.3 pp.439-446 (2017) : 439.
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG, KimSangBok. The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis. 2017; 12(3), 439-446. Available from: doi:10.34163/jkits.2017.12.3.006
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG and KimSangBok. "The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis" Journal of Knowledge Information Technology and Systems 12, no.3 (2017) : 439-446.doi: 10.34163/jkits.2017.12.3.006
Jae Yeong Choi; Baek Hyun Chul; PARK JAE HEUNG; KimSangBok. The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis. Journal of Knowledge Information Technology and Systems, 12(3), 439-446. doi: 10.34163/jkits.2017.12.3.006
Jae Yeong Choi; Baek Hyun Chul; PARK JAE HEUNG; KimSangBok. The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis. Journal of Knowledge Information Technology and Systems. 2017; 12(3) 439-446. doi: 10.34163/jkits.2017.12.3.006
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG, KimSangBok. The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis. 2017; 12(3), 439-446. Available from: doi:10.34163/jkits.2017.12.3.006
Jae Yeong Choi, Baek Hyun Chul, PARK JAE HEUNG and KimSangBok. "The Responding Model for Sniffing and Session Hijacking Using Traffic Variation Information and RST Signal Analysis" Journal of Knowledge Information Technology and Systems 12, no.3 (2017) : 439-446.doi: 10.34163/jkits.2017.12.3.006