نتایج جستجو برای: middle mitm
تعداد نتایج: 155067 فیلتر نتایج به سال:
Secure initial pairing of electronic gadgets is a challenging problem, especially considering lack of any common security infrastructure. The main security issue is the threat of so-called Man-in-the-Middle (MiTM) attacks, whereby an attacker inserts itself into the pairing protocol by impersonating one of the legitimate parties. A number of interesting techniques have been proposed, all of whi...
Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...
Human activity recognition systems (HARSs) are vital in a wide range of real-life applications and vibrant academic research area. Although they adopted many fields, such as the environment, agriculture, healthcare considered assistive technology, seem to neglect aspects security privacy. This problem occurs due pervasive nature sensor-based HARSs. Sensors devices with low power computational c...
Smart Grid (SG) research and development has drawn much attention from academia, industry government due to the great impact it will have on society, economics environment. Securing SG is a considerably significant challenge increased dependency communication networks assist in physical process control, exposing them various cyber-threats. In addition attacks that change measurement values usin...
Nowadays, the Internet of Things (IoT) devices and applications have rapidly expanded worldwide due to their benefits in improving business environment, industrial people’s daily lives. However, IoT are not immune malicious network traffic, which causes potential negative consequences sabotages operating devices. Therefore, developing a method for screening traffic is necessary detect classify ...
We present a new type of clogging DoS attacks, with the highest amplification factors achieved by off-path attackers, using only puppets, i.e., sandboxed malware on victim machines. Specifically, we present off-path variants of the Opt-ack, Ackstorm and Coremelt DoS attacks, achieving results comparable to these achieved previously achieved by eavesdropping/MitM attackers and (unrestricted) mal...
Bootstrapping trust between wireless devices without entering or preloading secrets is a fundamental security problem in many applications, including home networking, mobile device tethering, and the Internet-of-Things. This is because many new wireless devices lack the necessary interfaces (keyboard, screen, etc.) to manually enter passwords, or are often preloaded with default keys that are e...
The Address Resolution Protocol (ARP), has proved to work well under regular circumstances, but it is not equipped to cope with malicious hosts. Several methods to mitigate, detect and prevent these attacks do exist for the gateways/routers and nodes. This work is focused towards developing our own tailor made Intrusion Detection technique at the subnet level and we present an algorithm that de...
Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by means of handson experience. A virtual laboratory is implemented for the provision of training environments for practical exercises. Tele-Lab uses virtual machine (VM) technology and virtual network devices. A VM is used to represent a physical computer in an exercise scenario. While every VM needs a ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید