Cloak and Dagger: Man-In-The-Middle and Other Insidious Attacks

نویسندگان

  • Ramakrishna Thurimella
  • William Mitchell
چکیده

Information has always been very valuable. Computers are entrusted to maintain and process massive amounts of information. This makes them valuable targets to attackers. One of the most devastating forms of attack is when an attacker gains access to the information without the victim even being aware of it. This paper explores some of the means by which this surreptitious access to information can occur. Background material on basics of cryptography, the Diffie-Hellman key exchange, networking, Transport Layer Security and Secure Sockets Layer, and drive by downloads is provided in section 2. MITM attacks are defined in section 3. ARP spoofing, a form of a MITM attack, is explored in section 3.1. Futile defenses to MITM attacks are examined in section 3.2. A MITM attack on SSL using fake certificates is givenin section 3.3. Even more forms of MITM attacks are explored in section 3.4. Defenses are discussed in section 3.5. Finally, a new attack known as man in the browser is detailed in section 3.6. MITM attacks are not the only stealthy means by which information security is breached. Rootkits and botnets, which are capable of doing much more harm, can reside on victim’s computer while evading detection. Rootkits are defined in section 4. An example rootkit, Mebroot, is analyzed in ABSTRACT

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Fixed Point Attacks on GOST2 Block Cipher

GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...

متن کامل

Breast tuberculosis in a postmenopausal woman with an insidious manner: a case report

AbstractMammary tissue, skeletal muscle, and spleen are less frequently affected by mycobacterium tuberculosis (TB).The most common age for breast TB is between 50 and 70. On this article, we are reporting a 72-year-old womanwho presented with chronic cough, lobar consolidation in right middle lobe (RML) on the CXR, and a massin her right breast revealed on the physical examination. Biopsy from...

متن کامل

A TESLA-based mutual authentication protocol for GSM networks

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...

متن کامل

Political Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa

Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IJISP

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2009