نتایج جستجو برای: mitm attack

تعداد نتایج: 80860  

2011
Raz Abramov Amir Herzberg

We present Ack-storm DoS attacks, a new family of DoS attacks exploiting a subtle design flaw in the core TCP specifications. The attacks can be launched by a very weak MitM attacker, which can only eavesdrop occasionally and spoof packets (a Weakling in the Middle (WitM)). The attacks can reach theoretically unlimited amplification; we measured amplification of over 400,000 against popular web...

Journal: :Int. Arab J. Inf. Technol. 2016
Subashri Thangavelu Vaidehi Vijaykumar

Security in Voice over Internet Protocol (VoIP) network has turned to be the most challenging issue in recent years. VoIP packets are easy to eavesdrop on by hackers due to the use of Diffie-Hellman (DH) algorithm for single common key exchange between two end-users. As a result the confidentiality of voice data turns to be a challenging issue. There is a need for strong key management algorith...

Journal: :journal of electrical and computer engineering innovations 2014
fatemeh baghernejad nasour bagheri masoumeh safkhani

in this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by jannati and falahati (so-called jf). we prove that an adversary can recover key bits of jf protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. in addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...

Journal: :isecure, the isc international journal of information security 0
s. sajjadi ghaemmaghami department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran a. haghbin department of electrical and computer engineering, science and research branch, islamic azad university, tehran, iran m. mirmohseni department of electrical engineering, sharif university of technology, tehran, iran

radio frequency identification (rfid) applications have spread all over the world. in order to provide their security and privacy, researchers proposed different kinds of protocols. in this paper, we analyze the privacy of a new protocol, proposed by yu-jehn in 2015 which is based on electronic product code class1 generation 2 (epc c1 g2) standard. by applying the ouafi_phan privacy model, we s...

Journal: :Symmetry 2022

Mobile ad hoc networks (MANETs) are being used more and in a variety of fields, including the environment, energy efficiency, smart transportation, intelligent agriculture, Internet Things (IoT) ecosystems. They also anticipated to play an increasingly significant role future due strong evolution wireless technology recent years. Nevertheless, this inter-node communication is vulnerable various...

Journal: :Applied sciences 2022

In this paper, a layered architecture incorporating Blockchain technology (BCT) and Machine Learning (ML) is proposed in the context of Industrial Internet-of-Things (IIoT) for smart manufacturing applications. The composed five layers covering sensing, network/protocol, transport enforced with BCT components, application advanced services (i.e., data, ML cloud) layers. enables gathering sensor...

2016
Qie Hu Young Hwan Chang Claire J. Tomlin

On February 15, 2015, the Federal Aviation Administration proposed to allow routine use of certain small, non-recreational Unmanned Aerial Vehicles (UAVs) in today’s aviation system [1]. Thus in the near future, we may see UAVs such as Amazon Prime Air [2] and Google Project Wing vehicles [3] sharing the airspace. In order to manage this UAV traffic, we may imagine a scenario in which each UAV ...

2016
Johannes Harungguan Sianipar Christian Willems Christoph Meinel Hasso Plattner

Tele-Lab is a platform for e-learning in Internet security with a special focus on teaching by means of handson experience. A virtual laboratory is implemented for the provision of training environments for practical exercises. Tele-Lab uses virtual machine (VM) technology and virtual network devices. A VM is used to represent a physical computer in an exercise scenario. While every VM needs a ...

2016
Insu Yun Changwoo Min Xujie Si Yeongjin Jang Taesoo Kim Mayur Naik

API misuse is a well-known source of bugs. Some of them (e.g., incorrect use of SSL API, and integer overflow of memory allocation size) can cause serious security vulnerabilities (e.g., man-in-the-middle (MITM) attack, and privilege escalation). Moreover, modern APIs, which are large, complex, and fast evolving, are error-prone. However, existing techniques to help finding bugs require manual ...

2008
Jason Wells Damien Hutchinson Justin Pierce

There is increasing coverage in the literature highlighting threats to online financial systems. Attacks range from the prevalent reverse social engineering technique known as phishing; where spam emails are sent to customers with links to fake websites, to Trojans that monitor a customer’s account log on process that captures authentication details that are later replayed for financial gain. T...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید