Although cyber attacks are becoming smarter and use more advanced technologies, existing security mechanisms cannot promptly detect or respond to such attacks. For example, IP spoofing is effectively used to attack a security model using authentication process based on IP address or host name and, there is a large number of measures to detect such an attack. However, a malicious user can make a bypass attack by analyzing vulnerabilities. This study, therefore, has analyzed the vulnerability of 4-step BASE mechanism exploited by a bypass attack. © 2012 Springer-Verlag GmbH.
CITATION STYLE
Jung, S., Kim, J. H., & Kim, S. (2012). Study on 4-step BASE mechanism vulnerability analysis and design of evasion attack method for smart network. In Advances in Intelligent and Soft Computing (Vol. 143 AISC, pp. 417–422). https://doi.org/10.1007/978-3-642-27966-9_57
Mendeley helps you to discover research relevant for your work.