نتایج جستجو برای: mitm attack

تعداد نتایج: 80860  

Journal: :Register: jurnal ilmiah teknologi sistem informasi 2021

Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer peer, block hash, and proof-of-work secure the payload of process. The implementation uses hash on blockchain testing using White-box-testing security tests distributed system practitioners who are competent in MITM attacks. analyisis results before implementing show that s...

Journal: :IACR Cryptology ePrint Archive 2015
Jian Zou Le Dong

The Kupyna hash function was selected as the new Ukrainian standard DSTU 7564:2014 in 2015. It is designed to replace the old Independent States (CIS) standard GOST 34.311-95. The Kupyna hash function is an AES-based primitive, which uses Merkle-Damg̊ard compression function based on Even-Mansour design. In this paper, we show the first cryptanalytic attacks on the round-reduced Kupyna hash func...

Journal: :ITM web of conferences 2021

The smart home automation system is designed to conveniently manage and monitor household appliances lighting fixtures remotely, save time use resources effectively. It a control for allowing access devices. devices include lights, fan, camera doors. even enhances the main features of project from anywhere as remotely. With module, continuous surveillance protection accomplished. A significant ...

2012
Yali LIU Xiaolin QIN Bohan LI Liang LIU

The design of secure grouping-proof protocol is imperative to the pervasive deployment of low-cost RFIDs, though many protocols have been published recently. In this paper, we analyze the security vulnerabilities of a scalable grouping-proof protocol for RFID tags based on Shamir’s (n, n) secret sharing proposed by Dang and Kwangjo in 2009. This protocol attempts to alleviate many security weak...

Journal: :CoRR 2017
Yüksel Arslan

Most attacks are launched inside the companies by the employees of the same company. These kinds of attacks are generally against layer-2, not against layer-3 or IP. These attacks abuse the switch operation at layer-2. One of the attacks of this kind is Address Resolution Protocol (ARP) Spoofing (sometimes it is called ARP poisoning). This attack is classified as the “man in the middle” (MITM) ...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Since the nineties, Man-in-The-Middle (MITM) attack has been one of most effective strategies adopted for compromising information security in network environments. In this article, we focus our attention on ARP cache poisoning, which is well-known and more techniques performing MITM attacks Ethernet local area networks. More precisely, will prove that, environments with at least malicious host...

2011
Ahmed Patel Kenan Kalajdzic

In this paper we describe two novel methods for active detection and prevention of ARPpoisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these ...

Journal: :Jurnal infomedia : teknik informatika, multimedia, dan jaringan 2022

Kemajuan teknologi informasi yang semakin kencang harus diimbangi dengan kemampuan untuk melakukan pengamanan terhadap informasi. Berbagai masalah penyerangan jaringan bertujuan merugikan pengguna perlu kita pahami bagaimana konsep tersebut. Serangan MITM (Man In The Middle) membelokan traffic paket data melewati perangkat penyerang. Perangkat penyerang mengaku sebagai router ketika berkomunika...

Journal: :IEEE Transactions on Power Electronics 2021

Recent advancements in dc microgrids are largely based on distributed control strategies to enhance their reliability. However, due numerous vulnerabilities the communication layer, they susceptible cyber attacks. Hijacked link(s) could affect microgrid system reliability and operation many ways. Therefore, accuracy detection of compromised becomes very critical dynamic relationship between cyb...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید