نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

2016
Insu Yun Changwoo Min Xujie Si Yeongjin Jang Taesoo Kim Mayur Naik

API misuse is a well-known source of bugs. Some of them (e.g., incorrect use of SSL API, and integer overflow of memory allocation size) can cause serious security vulnerabilities (e.g., man-in-the-middle (MITM) attack, and privilege escalation). Moreover, modern APIs, which are large, complex, and fast evolving, are error-prone. However, existing techniques to help finding bugs require manual ...

2018
Rashidah Funke Olanrewaju Thouhedul Islam Othman O. Khalifa Fawwaz Eniola Fajingbesi

Received Jan 15, 2018 Revised Mar 15, 2018 Accepted Mar 29, 2018 The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and objec...

2017
Alexander Pretschner Mohsen Ahmadvand

Context In recent years, instant messaging has become a popular means of communication among users. This has led to an increased amount of data exchange over the network. The exchanged data is usually privacy-sensitive, which makes data protection crucial in such systems. The market leaders (such as Whatsapp and Telegram) aim at mitigating the risk by utilizing end-to-end asymmetric encryption,...

Journal: :IJITSA 2011
Nikos Vrakas Costas Lambrinoudakis

The convergence of different network types under the same architecture offers the opportunity for low cost multimedia services. The main objective has been the high quality of the provided services. However, considering that older equipment with limited processing capabilities may be present in such environments, a tradeoff between security and service quality is inevitable. Specifically, low r...

2014
Md. Waliullah Diane Gan

Wireless LANs are everywhere these days from home to large enterprise corporate networks due to the ease of installation, employee convenience, avoiding wiring cost and constant mobility support. However, the greater availability of wireless LANs means increased danger from attacks and increased challenges to an organization, IT staff and IT security professionals. This paper discusses the vari...

2010
Amir Herzberg Haya Shulman

We initiate study of the use of ‘secure tunnel’ protocols, specifically IPsec, and its availability and performance guarantees to higher-layer protocols, in particular TCP, against Denial/Degradation of Service (DoS) attacks. IPsec is designed to provide privacy and authentication against MITM attackers, and employs an anti-replay mechanism to ensure performance. For our analysis, we define a n...

2001
James M. Hayes

The issue of certificate masquerading against the SSL protocol is pointed out in [4]. In [4], various forms of server certificate masquerading are identified. It should also be noted that the attack described is a man-in-themiddle (MITM) attack that requires direct manipulation of the SSL protocol. This paper is a mirror of [4] and involves client certificate masquerading. The motivation for th...

Journal: :Applied sciences 2022

In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of Industrial Internet-of-Things (IIoT) for smart manufacturing applications. The composed five layers covering sensing, network/protocol, transport enforced with BCT components, application advanced services (i.e., data, ML cloud) layers. enables gathering sensor...

Journal: :U.Porto journal of engineering 2022

The technical improvements in modern power systems by the use of smart sensors, meters, multi-direction communication networks, and computers have given birth to cyber-physical grid networks. Any attack on is a threat grid's operation data collected from it. Therefore, security this diverse network primary concern. Two attacks tested paper are: Denial Service (DoS) Man In Middle (MITM). Remote ...

Journal: :International journal of interactive mobile technologies 2023

I
 n these days of technology, the usage images has become increasingly high especially now that almost everyone access to internet. Also, image helps us learn, grabs our attention, explains complicated concepts as well inspires us. Sharing is essential and therefore encryption algorithms are proposed secure transmission from many types attacks such Man-in-the-middle attack (MITM). In this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید