scispace - formally typeset
Search or ask a question

Answers from top 7 papers

More filters
Papers (7)Insight
This paper demonstrates that anyone with relevant server access not only can derive each session key agreed upon between any user and any server, but he/she also can masquerade as any user to login to whichever server in this system.
Based on the results and discussion, it is shown that the aplication of DeMilitarized Zone Method on microtic can secure the web testing on Siakad server of STMIK AKBA and can maintain the whole series of online services that are available in the server.
Open accessBook ChapterDOI
10 Jul 2017
20 Citations
Storing state on the server is the only option, but a malicious server can arbitrarily tamper with that information.
Book ChapterDOI
Guomin Yang, Duncan S. Wong, Xiaotie Deng 
04 Jul 2005
10 Citations
We present a new attacking technique which allows a malicious server to modify the user’s claim in the first step without being detected and provide a fake credential to the foreign server in the second step in such a way that the foreign server believes that the malicious server is the user’s home server.
When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency.
Proceedings ArticleDOI
Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim 
16 Oct 2007
268 Citations
From the experiments on a campus network, it is shown that the proposed mechanism can detect botnets effectively while bots are connecting to their server or migrating to another server.
Proceedings ArticleDOI
Eric Y. Chen, Mistutaka Itoh 
08 Jun 2010
29 Citations
In this paper, we argue that whitelist, as a strategy to defend against flooding attacks, can be more effective on a SIP server than a Web server.