{"title":"基于生物特征的网络安全协议防御分片报文攻击研究","authors":"Daesung Lee, Kuinam J. Kim, K. Kim","doi":"10.1109/ICISA.2011.5772416","DOIUrl":null,"url":null,"abstract":"With rapid advancement of internet and web technology, damage from phishing has been increasing. To meet this issue, network authentication protocol with security implementation has been extensively studied. Single authentication such as password identification requires the authentication upon login, and session might be interrupted by ill-intentioned user once session is accomplished. Authentication method for fragmented packet is proposed to block the fragmented network attack. To prevent communication overload from the insertion of additional authentication information, the corresponding information is inserted to identifier for IP header, and packet size is controlled.","PeriodicalId":425210,"journal":{"name":"2011 International Conference on Information Science and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Study on Network Security Protocol to Defend against Fragmented Packet Attacks Using Biometrics\",\"authors\":\"Daesung Lee, Kuinam J. Kim, K. Kim\",\"doi\":\"10.1109/ICISA.2011.5772416\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With rapid advancement of internet and web technology, damage from phishing has been increasing. To meet this issue, network authentication protocol with security implementation has been extensively studied. Single authentication such as password identification requires the authentication upon login, and session might be interrupted by ill-intentioned user once session is accomplished. Authentication method for fragmented packet is proposed to block the fragmented network attack. To prevent communication overload from the insertion of additional authentication information, the corresponding information is inserted to identifier for IP header, and packet size is controlled.\",\"PeriodicalId\":425210,\"journal\":{\"name\":\"2011 International Conference on Information Science and Applications\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-04-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Information Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2011.5772416\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2011.5772416","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Study on Network Security Protocol to Defend against Fragmented Packet Attacks Using Biometrics
With rapid advancement of internet and web technology, damage from phishing has been increasing. To meet this issue, network authentication protocol with security implementation has been extensively studied. Single authentication such as password identification requires the authentication upon login, and session might be interrupted by ill-intentioned user once session is accomplished. Authentication method for fragmented packet is proposed to block the fragmented network attack. To prevent communication overload from the insertion of additional authentication information, the corresponding information is inserted to identifier for IP header, and packet size is controlled.