نتایج جستجو برای: man in the middle mitm

تعداد نتایج: 21225329  

Journal: :Computers & Security 2008
Rolf Oppliger Ralf Hauser David A. Basin

Man-in-the-middle (MITM) attacks pose a serious threat to SSL/TLS-based e-commerce applications, and there are only a few technologies available to mitigate the risks. In [OHB05], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLSbased e-commerce applications against MITM attacks, and we proposed an implementation based on impersonal authentication tokens. ...

2013
Anne Canteaut María Naya-Plasencia Bastien Vayssière

This paper presents a new generic technique, named sievein-the-middle, which improves meet-in-the-middle attacks in the sense that it provides an attack on a higher number of rounds. Instead of selecting the key candidates by searching for a collision in an intermediate state which can be computed forwards and backwards, we look for the existence of valid transitions through some middle sbox. C...

2017
Shuxin Li Xiaohong Li Jianye Hao Bo An Zhiyong Feng Kangjie Chen Chengwei Zhang

The Man-in-the-Middle (MITM) attack has become widespread in networks nowadays. The MITM attack would cause serious information leakage and result in tremendous loss to users. Previous work applies game theory to analyze the MITM attack-defense problem and computes the optimal defense strategy to minimize the total loss. It assumes that all defenders are cooperative and the attacker know defend...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید مدنی آذربایجان - دانشکده ادبیات و زبانهای خارجی 1389

according to coates’s (2004, as cited in zhang, 2010) definition of "conversational dominance" (p.111), it refers to the phenomenon of a speaker dominating others in interaction. specifically, it means how a speaker makes use of certain strategies to get the floor and maintain the floor. thus, the amount of talk is the main measurement for the dominance of the conversation. whether a speaker do...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2023

Man-in-the-middle (MitM) attacks became one of the most risk on OpenFlow communication channel in software-defined networking, its detection is a very hard task due there no authentication protocol. This important network and responsible for sending control commands from controller to switches, so once hacked, entire controlled by attacker. Therefore, we propose complementary solution transport...

Journal: :ITM web of conferences 2021

The smart home automation system is designed to conveniently manage and monitor household appliances lighting fixtures remotely, save time use resources effectively. It a control for allowing access devices. devices include lights, fan, camera doors. even enhances the main features of project from anywhere as remotely. With module, continuous surveillance protection accomplished. A significant ...

Journal: :IEEE Transactions on Dependable and Secure Computing 2022

Since the nineties, Man-in-The-Middle (MITM) attack has been one of most effective strategies adopted for compromising information security in network environments. In this article, we focus our attention on ARP cache poisoning, which is well-known and more techniques performing MITM attacks Ethernet local area networks. More precisely, will prove that, environments with at least malicious host...

Journal: :Gazi Üniversitesi Fen Bilimleri dergisi 2021

Security Socket Layer (SSL) / Transport (TLS) protocols are utilized to secure network communication (e.g., transmitting user data). Failing properly implement SSL/TLS configuration during the app development results in security risks. The weak implementations include trusting all host names, certificates, ignoring certificate verification errors, even lack of SSL public key pinning usage. Thes...

2012
Ralph Holz Thomas Riedmaier Nils Kammenhuber Georg Carle

Although recent compromises and admissions have given new credibility to claimed encounters of Man-in-the-middle (MitM) attacks on SSL/TLS, very little proof exists in the public realm. In this paper, we report on the development and deployment of Crossbear, a tool to detect MitM attacks on SSL/TLS and localise their position in the network with a fair degree of confidence. MitM attacks are det...

2010
Sebastian Roschke Luan Ibraimi Feng Cheng Christoph Meinel

Secured communication has been widely deployed to guarantee confidentiality and integrity of connections over untrusted networks, e.g., the Internet. Although secure connections are designed to prevent attacks on the connection, they hide attacks inside the channel from being analyzed by Intrusion Detection Systems (IDS). Furthermore, secure connections require a certain key exchange at the ini...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید