2012 | OriginalPaper | Chapter
Study on 4-Step BASE Mechanism Vulnerability Analysis and Design of Evasion Attack Method for Smart Network
Authors : Sungmo Jung, Jong Hyun Kim, Seoksoo Kim
Published in: Business, Economics, Financial Sciences, and Management
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Although cyber attacks are becoming smarter and use more advanced technologies, existing security mechanisms cannot promptly detect or respond to such attacks. For example, IP spoofing is effectively used to attack a security model using authentication process based on IP address or host name and, there is a large number of measures to detect such an attack. However, a malicious user can make a bypass attack by analyzing vulnerabilities. This study, therefore, has analyzed the vulnerability of 4-step BASE mechanism exploited by a bypass attack.