{"title":"通过修改计算机网络通信协议来保护计算机网络通信","authors":"M. Youssef","doi":"10.1109/ITST.2011.6060130","DOIUrl":null,"url":null,"abstract":"This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing \"man in the middle\" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.","PeriodicalId":220290,"journal":{"name":"2011 11th International Conference on ITS Telecommunications","volume":"51 5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Securing computer networks communication by modifying computer network communication protocols\",\"authors\":\"M. Youssef\",\"doi\":\"10.1109/ITST.2011.6060130\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing \\\"man in the middle\\\" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.\",\"PeriodicalId\":220290,\"journal\":{\"name\":\"2011 11th International Conference on ITS Telecommunications\",\"volume\":\"51 5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-10-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 11th International Conference on ITS Telecommunications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ITST.2011.6060130\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 11th International Conference on ITS Telecommunications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ITST.2011.6060130","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Securing computer networks communication by modifying computer network communication protocols
This research presents a technique to protect computer networks communication by modifying communication protocol identifier. The main advantage of this technique is preventing "man in the middle" meddling from reconstructing sessions from collected data. Consequently, this approach can overcome seamless attacks performed by passive tapping and nonintrusive data captu ring techniques.