{"title":"Securing computer networks communication by modifying computer network communication protocols","authors":"M. Youssef","doi":"10.1109/ITST.2011.6060130","DOIUrl":null,"url":null,"abstract":"This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing \"man in the middle\" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"51 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 11th International Conference on ITS Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITST.2011.6060130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.