نتایج جستجو برای: mitm attack

تعداد نتایج: 80860  

Journal: :Lecture Notes in Computer Science 2023

The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it hard efficiently find the best DS-MITM attacks on most ciphers except for AES. Moreover, current automatic tools only capture basic version attacks, and critical techniques developed enhancing (e.g., enumeration key-dependent-sieve) still rely manual work. In ...

Journal: :CoRR 2012
K. Saravanan L. Vijayanand R. K. Negesh

As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that supp...

2012
Saurabh R Kulkarni Chinmay Khasnis

This paper deals with modern cellular phones that operate on Voice over Internet Protocol, their current development, several Information security risks associated with them and various countermeasures that can be undertaken to prevent data theft/misuse. VoIP is vulnerable to well known traditional modes of attack such as Denial of Service (DoS),Man in the middle (MiTM) etc but also introduces ...

Journal: :Expert Systems With Applications 2022

Multi-Channel Man-in-the-Middle (MitM) attacks are special MitM capable of manipulating encrypted wireless frames between two legitimate endpoints. Since its inception in 2014, attackers have been targeting Wi-Fi networks to perform different attacks, such as cipher downgrades, denial service, key reinstallation (KRACK) 2017, and recently FragAttacks 2021, which widely impacted millions devices...

Journal: :E3S web of conferences 2023

SSL/TLS (Secure Socket Layer/Transport Layer Security)-enabled web applications are designed to provide authentication based on a public key certificate, as well generating secure session and traffic privacy symmetric key. Today, large number of e-commerce such stock trading, banking, shopping gaming rely the robustness protocol. Recently, potential threat known Man-in-the-Middle or main-in-the...

Journal: :IET cyber-physical systems 2021

Man-in-The-Middle (MiTM) attacks present numerous threats to a smart grid. In MiTM attack, an intruder embeds itself within conversation between two devices either eavesdrop or impersonate one of the devices, making it appear be normal exchange information. Thus, can perform false data injection (FDI) and command (FCI) that compromise power system operations, such as state estimation, economic ...

2005
R. Zakeri H. R. Shahriari R. Jalili R. Sadoddin

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

2007
Reza Zakeri Hamid Reza Shahriari Rasool Jalili Reza Sadoddin

The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and ...

Journal: :CoRR 2012
Robayet Nasim

Exponential growth of the volume of Bluetooth-enabled devices indicates that it has become a popular way of wireless interconnections for exchanging information. The main goal of this paper is to analyze the most critical Bluetooth attacks in real scenarios. In order to find out the major vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have performed successfully such...

Journal: :International Journal of Engineering and Management Research 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید