Hybrid Detection and Mitigation of DNS Protocol MITM attack based on Firefly algorithm with Elliptical Curve Cryptography
نویسندگان
چکیده
A Domain Name Server is a critical Internet component. It enables users to surf the web and send emails. DNS database used by millions ofcomputers determine which address best answers user’s query. an unencrypted protocol that may be exploited in numerous ways. The mostpopular MITM attack uses poisoning intercept communications fake them. servers do not verify IP addresses they forwardtraffic to. In attacks, attacker either targets domain name or attempts exploit system weaknesses. Proposed FFOBLA-ECC model detects Spoofed nodes wireless network using optimized firefly boosted LSTM with help of TTL RTR parametersreceived from simulation environment provides authentication between order mitigate it Elliptical curve cryptography. proposed results are different other methods yield highly accurate beyond 98% compared existing RF, ARF, KNN methods.
منابع مشابه
Identity Based Encryption through Elliptical Curve Cryptography
Although the Boneh and Franklin identity-based encryption scheme is not overly complex theoretically, the implementation of the system proves to be somewhat difficult. 1 Identity Based Encryption: The difficulty with public key encryption involves distribution of the keys and the assumption that they will always be available (Ding 194). It is not always practical to be connected to a key certif...
متن کاملBlind Signature Scheme Based On Elliptical Curve Cryptography ( ECC ) Preeti
Blind signature is a concept to ensure anonymity of e-coins. Untracebility and unlinkability are ttwo main properties of real coins and should also be mimicked electronicaly. A user has fulfill above two properties of blind signature for permission to send an e-coins. During the last few years, asymmetric cryptography based on curve based cryptography have becomes very popular, especially for e...
متن کاملSecuring AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملElliptic Curve Cryptography Based Wireless Authentication Protocol
Recently, Aydos et al. proposed an ECC-based wireless authentication protocol. Because their protocol is based on ECC, the protocol has significant advantage including lower computational burden, lower communication bandwidth and storage requirements. However, Mangipudi et al showed that the protocol is vulnerable to the man-inthe-middle attack from the attacker within the system and proposed a...
متن کاملA hybrid meta-heuristic algorithm based on ABC and Firefly algorithms
Abstract— In this paper we have tried to develop an altered version of the artificial bee colony algorithm which is inspired from and combined with the meta-heuristic algorithm of firefly. In this method, we have tried to change the main equation of searching within the original ABC algorithm. On this basis, a new combined equation was used for steps of employed bees and onlooker bees. For this...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: EAI Endorsed Transactions on Pervasive Health and Technology
سال: 2022
ISSN: ['2411-7145']
DOI: https://doi.org/10.4108/eetpht.v8i4.3081