نتایج جستجو برای: middle mitm
تعداد نتایج: 155067 فیلتر نتایج به سال:
The Internet of things (IoT) has become a significant element of next generation. IoT is a proposed development of the internet in which the objects have network connectivity able to transmit and receive data. The IoT applications such as smart homes, smart cities and health care. WSN is an important technology of IoT. Typically sensor nodes are considered resource constrained device with limit...
Long Term Evolution (LTE) is the most recent generation of mobile communications promising increased transfer rates and enhanced security features. It is todays communication technology for mobile Internet as well as considered for the use in critical infrastructure, making it an attractive target to a wide range of attacks. We evaluate the implementation correctness of LTE security functions t...
In May 2012, a highly advanced malware for espionage dubbed Flame was found targeting the Middle-East. As it turned out, it used a forged signature to infect Windows machines by MITM-ing Windows Update. Using counter-cryptanalysis, Stevens found that the forged signature was made possible by a chosen-prefix attack on MD5 [Ste13]. He uncovered some details that prove that this attack differs fro...
Though attacks on the industrial control system (ICS) and their protocols are not a new occurrence, recent years have highlighted a growing trend in such attacks. To make matters worse, cyber defenders have also dealt with a slow migration to more secure ICS protocols due to costs associated with equipment downtime. With the increase in attacks and the slow migration to more secure ICS protocol...
Keamanan data telah menjadi ancaman yang paling sensitive dan sering terjadi ditengah meningkatnya trafik cukup massif dalam jaringan internet. Untuk menjaga keamanan ada berbagai metode di usulkan diataranya dengan kriptografi. Kriptografi merupakan teknik matematika untuk menyandikan informasi (plaintext) ke bentuk tidak bisa baca atau dipahami (ciphertext) disebut proses enkripsi. kunci sime...
The rapid development of Internet Things (IoT) technology, together with mobile network has created a never-before-seen world interconnection, evoking research on how to make it vaster, faster, and safer. To support the ongoing fight against malicious misuse networks, in this paper we propose novel algorithm called AMDES (unmanned aerial system multifractal analysis intrusion detection system) ...
Unmanned aerial vehicles have found applications in fields such as environmental monitoring and the military. Although collected data some of these application domains are sensitive, public channels deployed during communication process. Therefore, many protocols been presented to preserve confidentiality integrity exchanged messages. However, numerous security performance challenges noted majo...
Encryption algorithms are critical in ensuring the security of information today's rapidly evolving internet and network applications. These especially important for internet-based dynamic applications storage methods like cloud computing, which require high reliability, scalability, autonomy to enable ubiquitous access. Given prevalence computing our everyday routines, data has emerged as a ma...
While the IoT is making our lives much easier, managing the IoT becomes a big issue due to the huge number of connections, and the lack of protections for devices. Recent work shows that Software-defined Networking (SDN) has a great capability in automatically and dynamically managing network flows. Besides, switches in SDNs are usually powerful machines, which can be used as fog nodes simultan...
Protection of Internet communication is becoming more common in many products, as the demand for privacy in an age of state-level adversaries and crime syndicates is steadily increasing. The industry standard for doing this is TLS. The TLS protocol supports a multitude of key agreement and authentication options which provide various different security guarantees. Recent attacks showed that thi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید