Published in

Encyclopedia of Cryptography and Security, p. 553-556

DOI: 10.1007/978-1-4419-5906-5_652

Links

Tools

Export citation

Search in Google Scholar

Header Based Attacks

This paper was not found in any repository, but could be made available legally by the author.
This paper was not found in any repository, but could be made available legally by the author.

Full text: Unavailable

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

Header-based attacks are a form of computer offensive in which the attacker uses its ability to forge arbitrary header data to exploit a flaw in the target’s software that will process this header. This flaw can reside in the code making the processing, but also, more dangerously, in the protocol describing this processing.Although this kind of attack can be used with any level of the protocol stack, the term “Header Attack” is increasingly used to describe application-level attacks, like, for example, HTTP header attacks.