Results 41 to 50 of about 308,714 (183)
Recently, the process control network (PCN) of oil and gas installation has been subjected to amorphous cyber-attacks. Examples include the denial-of-service (DoS), distributed denial-of-service (DDoS), and man-in-the-middle (MitM) attacks, and this may ...
Ugochukwu Onyekachi Obonna +6 more
doaj +1 more source
Detecting Man-in-the-Middle Attacks by Precise Timing [PDF]
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with advances in distributed computing technologies and have assumed several shapes ranging from simple IP spoofing to complicated attacks on wireless communications, which have safety-critical applications such as remote wireless ...
Aziz, Benjamin, Hamilton, G.
openaire +2 more sources
Interactive Password Schemes [PDF]
Only the abstract is available for this technical report.Usual password schemes suffer from the flaw that they are easy to steal. An attacker who has correctly observed a login session (by peeping, wiretapping and/or by launching a "man-in-the-middle ...
Itkis, Gene, Maiss, Arwa
core +1 more source
Trust Implications of DDoS Protection in Online Elections
Online elections make a natural target for distributed denial of service attacks. Election agencies wary of disruptions to voting may procure DDoS protection services from a cloud provider.
Culnane, Chris +3 more
core +1 more source
Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking
The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat
Nahla Ibraheem Jabbar
doaj +1 more source
Kombinasi Waktu Sinkronisasi dan Nilai Salt untuk Peningkatan Keamanan pada Single Sign-On
Single sign-on (SSO) is a session authentication process that allows a user to login by using user registered identity and password in order to access appropriate applications.
Rizal Munadi +4 more
doaj +1 more source
Concurrently Non-Malleable Zero Knowledge in the Authenticated Public-Key Model [PDF]
We consider a type of zero-knowledge protocols that are of interest for their practical applications within networks like the Internet: efficient zero-knowledge arguments of knowledge that remain secure against concurrent man-in-the-middle attacks. In an
Deng, Yi +2 more
core +3 more sources
A Lightweight Elliptic-Elgamal-Based Authentication Scheme for Secure Device-to-Device Communication
Device-to-Device (D2D) is a major part of 5G that will facilitate deployments with extended coverage where devices can act as users or relays. These relays normally act as decode and forward relays (semi-intelligent devices) with limited computational ...
Adeel Abro +2 more
doaj +1 more source
In this study, the effectiveness of encrypted control systems in detecting attacks is experimentally demonstrated using a networked control system testbed that allows for man-in-the-middle (MITM) attacks.
Akane Kosugi +2 more
doaj +1 more source
Resilient Distributed Optimization Algorithms for Resource Allocation [PDF]
Distributed algorithms provide flexibility over centralized algorithms for resource allocation problems, e.g., cyber-physical systems. However, the distributed nature of these algorithms often makes the systems susceptible to man-in-the-middle attacks ...
Alizadeh, Mahnoosh +2 more
core +1 more source

