Please use this identifier to cite or link to this item:
http://irepo.futminna.edu.ng:8080/jspui/handle/123456789/27570
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Abdulkarim, Muhammad Kabir | - |
dc.contributor.author | Olawale, Surajudeen Adebayo | - |
dc.contributor.author | Abdulhamid, Shafii Muhammad | - |
dc.contributor.author | Bashir, Sulaimon Adebayo | - |
dc.date.accessioned | 2024-04-28T11:18:59Z | - |
dc.date.available | 2024-04-28T11:18:59Z | - |
dc.date.issued | 2022-08 | - |
dc.identifier.citation | 38. Abdulkarim, M. K., Adebayo, O. S., Abdulhamid, S. M., & Bashir, S. A. (2022). Systematic Review of Session Hijacking Attacks on 5G Network. 2nd International Open University Conference on Research and Integrated Sciences (IOUCRIS 2022) Joint Hosted -The Gambia-Malaysia. | en_US |
dc.identifier.uri | http://repository.futminna.edu.ng:8080/jspui/handle/123456789/27570 | - |
dc.description.abstract | Cyberattacks, such as session hijacking, are possible on computer networks, with attackers abusing the network's inherent vulnerability. This attack occurs when hacker takes over a user's session id and gains complete control of the system while the session is continuing. An adversary serving as a proxy can get unauthorized access to data and applications in systems/services/networks after obtaining the compromised session key or token. This research carried out a thorough examination of the activities of session hijacking attacks on computer networks which were published between 2017 and 2021 and focused more on 5G network. Different techniques adopted by hackers were examined and x-rayed and mitigation strategies are reported. In addition, the paper proposes a model that can be used to check the effect of session hijacking attacks on 5G network. | en_US |
dc.language.iso | en | en_US |
dc.publisher | 2nd IOU Conference on Research and Integrated Sciences (IOUCRIS) 2022 | en_US |
dc.subject | Cyberattacks, Session Hijacking, Session Hijacking Attacks, 5G network, Attack Mitigation Strategies | en_US |
dc.title | SYSTEMATIC REVIEW OF SESSION HIJACKING ATTACKS ON 5G NETWORK | en_US |
dc.type | Article | en_US |
Appears in Collections: | Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
A SYSTEMATIC REVIEW OF SESSION H Conference.pdf | 950.76 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.