Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/18473
Title: Systematic Review of Session Hijacking Attacks on 5G Network
Authors: Abdulkarim, Muhammad Kabir
Adebayo, Olawale Surajudeen
Abdulhamid, Shafii Muhammad
Bashir, Sulaimon Adebayo
Keywords: Cyberattacks
Session Hijacking
Session Hijacking Attacks
5G network
Attack Mitigation Strategies
Issue Date: 26-Aug-2022
Publisher: 2nd IOU Conference on Research and Integrated Sciences (IOUCRIS) 2022. International Open University,
Abstract: Cyberattacks, such as session hijacking, are possible on computer networks, with attackers abusing the network's inherent vulnerability. This attack occurs when hacker takes over a user's session id and gains complete control of the system while the session is continuing. An adversary serving as a proxy can get unauthorized access to data and applications in systems/services/networks after obtaining the compromised session key or token. This research carried out a thorough examination of the activities of session hijacking attacks on computer networks which were published between 2017 and 2021 and focused more on 5G network. Different techniques adopted by hackers were examined and x-rayed and mitigation strategies are reported. In addition, the paper proposes a model that can be used to check the effect of session hijacking attacks on 5G network.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18473
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
A SYSTEMATIC REVIEW OF SESSION H Conference.pdfA Sytematic Review of Session Hijacking Attacks on 5G Network950.76 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.