Study on 4-step BASE mechanism vulnerability analysis and design of evasion attack method for smart network

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although cyber attacks are becoming smarter and use more advanced technologies, existing security mechanisms cannot promptly detect or respond to such attacks. For example, IP spoofing is effectively used to attack a security model using authentication process based on IP address or host name and, there is a large number of measures to detect such an attack. However, a malicious user can make a bypass attack by analyzing vulnerabilities. This study, therefore, has analyzed the vulnerability of 4-step BASE mechanism exploited by a bypass attack. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Jung, S., Kim, J. H., & Kim, S. (2012). Study on 4-step BASE mechanism vulnerability analysis and design of evasion attack method for smart network. In Advances in Intelligent and Soft Computing (Vol. 143 AISC, pp. 417–422). https://doi.org/10.1007/978-3-642-27966-9_57

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free