IP spoofing and session hijacking
โ Scribed by Dan Thomsen
- Book ID
- 104391221
- Publisher
- Elsevier Science
- Year
- 1995
- Tongue
- English
- Weight
- 670 KB
- Volume
- 1995
- Category
- Article
- ISSN
- 1353-4858
No coin nor oath required. For personal study only.
โฆ Synopsis
The internet, as well as the mainstream media, has been a buzz with discusslons of hackers using a new modis operandi in attacking systems. The latest headline grabbing attack was well planned and well executed, like a James Bond covert operation. The attack was directed at Tsutomu Shimomura, a noted Unix security expert at San Diego's Super Computer Center. It is only due to his diligence as a system administrator and skill at computer crime forensics that enabled Tsutomu to piece together how the attack was staged.
Tsutomu was enjoying his Christmas vacation when he received a call from a student who was watching the 'farm' while Tsutomu was away. The student noticed that the audit logs had changed size, but it was not obvious how. Tsutomu ended his vacation early so he could get to the bottom of the mystery.
Misuse and Anomaly
Detection Workshop in Sonoma California, on 11 th
๐ SIMILAR VOLUMES
An efficient IP Multimedia Subsystem (IMS) online charging system is important for operator revenue generation. However, 3rd Generation Partnership Project (3GPP) specifications do not adequately address how online session charging shall be accomplished for IMS networks, especially how IMS network e