نتایج جستجو برای: middle mitm

تعداد نتایج: 155067  

2005
Reza Zakeri Rasool Jalili Hamid Reza Shahriari

The emerging size and complexity of computer networks and also various services provided by them makes the networks vulnerable to numerous attacks. Although in the last few years a more logical approach to TCP/IP network security problem has been followed, a complete and sound formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model to ana...

2012
Italo Dacosta Mustaque Ahamad Patrick Traynor

The security guarantees provided by SSL/TLS depend on the correct authentication of servers through certificates signed by a trusted authority. However, as recent incidents have demonstrated, trust in these authorities is not well placed. Increasingly, certificate authorities (by coercion or compromise) have been creating forged certificates for a range of adversaries, allowing seemingly secure...

Journal: :J. Inform. and Commun. Convergence Engineering 2014
Jung-Ha Kang Yang Sun Lee Jae Young Kim Eun-Gi Kim

Although the Internet protocol (IP) has become widely successful, it has led to many security issues. Many of these security issues are related to illegal host access. An address resolution protocol (ARP) spoofing attack is another security issue related to an illegal host access. This paper deals with the prevention of these ARP spoofing attacks. ARP provides dynamic mapping between two differ...

2013
Zhuo Hao Sheng Zhong Nenghai Yu

A number of key agreement schemes based on wireless channel characteristics have been proposed recently. However, previous key agreement schemes require that two nodes which need to agree on a key are within the communication range of each other. Hence, they are not suitable for multihop wireless networks, in which nodes do not always have direct connections with each other. In this paper, we f...

Journal: :Inf. Process. Lett. 2016
Mohamed Tolba Amr M. Youssef

TWINE is a lightweight block cipher which employs a generalized Feistel structure with 16 nibble-blocks. It has two versions: TWINE-80 and TWINE-128, both have a block length of 64 bits and employ keys of length 80 and 128 bits, respectively. In this paper, we propose a low data complexity key recovery attack on the full cipher. This attack is inspired by the 3-subset Meet-in-the-Middle (MitM) ...

2014
Shijun Zhao Qianying Zhang Yu Qin Dengguo Feng

Trusted Network Connect (TNC) requires both user authentication and integrity validation of an endpoint before it connects to the internet or accesses some web service. However, as the user authentication and integrity validation are usually done via independent protocols, TNC is vulnerable to the Man-in-the-Middle (MitM) attack. This paper analyzes TNC which uses keys with Subject Key Attestat...

Journal: :IFIP advances in information and communication technology 2022

More and more Internet traffic is encrypted. While this protects the confidentiality integrity of communication, it prevents network monitoring systems (NMS) from effectively analyzing now encrypted payloads. Many enterprise networks have deployed man-in-the-middle (MitM) proxies that intercept TLS connections at border to examine packet payloads regain visibility. However, interception via Mit...

Journal: :International Journal of Engineering and Management Research 2020

Journal: :Expert Systems 2023

One of the most common attacks is man-in-the-middle (MitM) which, due to its complex behaviour, difficult detect by traditional cyber-attack detection systems. MitM on internet things systems take advantage special features protocols and cause system disruptions, making them invisible legitimate elements. In this work, an intrusion (IDS), where intelligent models can be deployed, approach type ...

Journal: :Genetics 2005
Haja N Kadarmideen Luc L G Janss

Bayesian segregation analyses were used to investigate the mode of inheritance of osteochondral lesions (osteochondrosis, OC) in pigs. Data consisted of 1163 animals with OC and their pedigrees included 2891 animals. Mixed-inheritance threshold models (MITM) and several variants of MITM, in conjunction with Markov chain Monte Carlo methods, were developed for the analysis of these (categorical)...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید