Results 41 to 50 of about 308,714 (183)

Detection of Man-in-the-Middle (MitM) Cyber-Attacks in Oil and Gas Process Control Networks Using Machine Learning Algorithms

open access: yesFuture Internet, 2023
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
Ugochukwu Onyekachi Obonna   +6 more
doaj   +1 more source

Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]

open access: yes2009 Third International Conference on Emerging Security Information, Systems and Technologies, 2009
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire   +2 more sources

Interactive Password Schemes [PDF]

open access: yes, 2004
Only the abstract is available for this technical report.Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle ...
Itkis, Gene, Maiss, Arwa
core   +1 more source

Trust Implications of DDoS Protection in Online Elections

open access: yes, 2017
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris   +3 more
core   +1 more source

Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking

open access: yesمجلة النهرين للعلوم الهندسية
The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat
Nahla Ibraheem Jabbar
doaj   +1 more source

Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2016
Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications.
Rizal Munadi   +4 more
doaj   +1 more source

Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [PDF]

open access: yes, 2006
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an
Deng, Yi   +2 more
core   +3 more sources

A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication

open access: yesFuture Internet, 2019
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational ...
Adeel Abro   +2 more
doaj   +1 more source

Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks

open access: yesIEEE Access
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi   +2 more
doaj   +1 more source

Resilient Distributed Optimization Algorithms for Resource Allocation [PDF]

open access: yes, 2019
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks ...
Alizadeh, Mahnoosh   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy