Paper
13 January 2012 An improved anti-leech mechanism based on session identifier
Jianbiao Zhang, Tong Zhu, Han Zhang, Li Lin
Author Affiliations +
Abstract
With the rapid development of information technology and extensive requirement of network resource sharing, plenty of resource hotlinking phenomenons appear on the internet. The hotlinking problem not only harms the interests of legal websites but also leads to a great affection to fair internet environment. The anti-leech technique based on session identifier is highly secure, but the transmission of session identifier in plaintext form causes some security flaws. In this paper, a proxy hotlinking technique based on session identifier is introduced firstly to illustrate these security flaws; next, this paper proposes an improved anti-leech mechanism based on session identifier, the mechanism takes the random factor as the core and detects hotlinking request using a map table that contains random factor, user's information and time stamp; at last the paper analyzes the security of mechanism in theory. The result reveals that the improved mechanism has the merits of simple realization, high security and great flexibility.
© (2012) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jianbiao Zhang, Tong Zhu, Han Zhang, and Li Lin "An improved anti-leech mechanism based on session identifier", Proc. SPIE 8349, Fourth International Conference on Machine Vision (ICMV 2011): Machine Vision, Image Processing, and Pattern Analysis, 834911 (13 January 2012); https://doi.org/10.1117/12.920141
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Information security

Legal

Computer security

Network security

Internet

Information technology

Machine vision

RELATED CONTENT

A cybersecurity strategy for Industry 4.0
Proceedings of SPIE (May 02 2019)
Security of information in IT systems
Proceedings of SPIE (February 23 2005)
Design of secure group key management system
Proceedings of SPIE (July 26 2001)
Internet-based secure virtual networks
Proceedings of SPIE (September 16 1998)

Back to Top