๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

IP spoofing and session hijacking

โœ Scribed by Dan Thomsen


Book ID
104391221
Publisher
Elsevier Science
Year
1995
Tongue
English
Weight
670 KB
Volume
1995
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

โœฆ Synopsis


The internet, as well as the mainstream media, has been a buzz with discusslons of hackers using a new modis operandi in attacking systems. The latest headline grabbing attack was well planned and well executed, like a James Bond covert operation. The attack was directed at Tsutomu Shimomura, a noted Unix security expert at San Diego's Super Computer Center. It is only due to his diligence as a system administrator and skill at computer crime forensics that enabled Tsutomu to piece together how the attack was staged.

Tsutomu was enjoying his Christmas vacation when he received a call from a student who was watching the 'farm' while Tsutomu was away. The student noticed that the audit logs had changed size, but it was not obvious how. Tsutomu ended his vacation early so he could get to the bottom of the mystery.

Misuse and Anomaly

Detection Workshop in Sonoma California, on 11 th


๐Ÿ“œ SIMILAR VOLUMES


IP multimedia subsystem online session c
โœ Yigang Cai; Xian Yang Li; Yile Wang; John B. Reid; Peng Wang ๐Ÿ“‚ Article ๐Ÿ“… 2006 ๐Ÿ› Institute of Electrical and Electronics Engineers ๐ŸŒ English โš– 150 KB

An efficient IP Multimedia Subsystem (IMS) online charging system is important for operator revenue generation. However, 3rd Generation Partnership Project (3GPP) specifications do not adequately address how online session charging shall be accomplished for IMS networks, especially how IMS network e