نتایج جستجو برای: middle mitm
تعداد نتایج: 155067 فیلتر نتایج به سال:
Deep Neural Networks (DNNs) are vulnerable to deliberately crafted adversarial examples. In the past few years, many efforts have been spent on exploring query-optimisation attacks find examples of either black-box or white-box DNN models, as well defending countermeasures against those attacks. this article, we explore vulnerabilities models under umbrella Man-in-the-Middle (MitM) attacks, whi...
In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds a...
Presented herein is a User-SpecificKey Scheme based on Elliptic Curve Cryptography that defeats man-inthe-middle attacks cryptocurrency exchange accounts. In this scheme, separate public and private key pair assigned to every account the shifted either forward or backward elliptic curve by difference of user’s password. When user logs into his account, server sends account. The computes actual ...
Detecting man-in-the-middle attacks via hybrid quantumclassical protocol in software-defined network
Man-in-the-middle (MitM) attacks became one of the most risk on OpenFlow communication channel in software-defined networking, its detection is a very hard task due there no authentication protocol. This important network and responsible for sending control commands from controller to switches, so once hacked, entire controlled by attacker. Therefore, we propose complementary solution transport...
Recent advancements in dc microgrids are largely based on distributed control strategies to enhance their reliability. However, due numerous vulnerabilities the communication layer, they susceptible cyber attacks. Hijacked link(s) could affect microgrid system reliability and operation many ways. Therefore, accuracy detection of compromised becomes very critical dynamic relationship between cyb...
The Next Steps In Signalling (NSIS) protocol suite represents an extensible framework for enabling various signalling applications over IP-based networks. The framework consists of two layers that need different types of security protection; the lower layer mainly deals with the discovery of adjacent peers and establishment of channel security to protect the delivery of signalling messages betw...
Khudra is a hardware-oriented lightweight block cipher that is designed to run efficiently on Field Programmable Gate Arrays. It employs an 18-rounds Generalized type-2 Feistel Structure with a 64bit block length and an 80-bit key. In this paper, we present Meet-inthe-Middle (MitM) attacks on 13 and 14 round-reduced Khudra. These attacks are based on finding a distinguisher that is evaluated of...
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...
The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...
This paper describes two novel methods for active detection and prevention of ARP-poisoning-based Man-inthe-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید