2012 | OriginalPaper | Buchkapitel
Study on 4-Step BASE Mechanism Vulnerability Analysis and Design of Evasion Attack Method for Smart Network
verfasst von : Sungmo Jung, Jong Hyun Kim, Seoksoo Kim
Erschienen in: Business, Economics, Financial Sciences, and Management
Verlag: Springer Berlin Heidelberg
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
Although cyber attacks are becoming smarter and use more advanced technologies, existing security mechanisms cannot promptly detect or respond to such attacks. For example, IP spoofing is effectively used to attack a security model using authentication process based on IP address or host name and, there is a large number of measures to detect such an attack. However, a malicious user can make a bypass attack by analyzing vulnerabilities. This study, therefore, has analyzed the vulnerability of 4-step BASE mechanism exploited by a bypass attack.