Results 141 to 150 of about 640,321 (187)
Some of the next articles are maybe not open access.

A Survey of Man In The Middle Attacks

IEEE Communications Surveys & Tutorials, 2016
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself.
CONTI, MAURO   +2 more
openaire   +3 more sources

Revisiting man-in-the-middle attacks against HTTPS

Network Security, 2022
A man-in-the-middle (MitM) attack enables threat actors to position themselves in a conversation between two parties. It can be used to eavesdrop on, or impersonate, either of the parties and may enable the perpetrator to steal personal information, including login credentials, payment card data and account details.
Vyron Kampourakis   +3 more
openaire   +1 more source

Characterizing Wi-Fi Man-In-the-Middle Attacks

2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science, 2020
Wi-Fi networks are widely deployed and used privately or professionally. However, many tools exist to implement Man-in-The-Middle attacks, on these networks, to intercept data. If certain Wi-Fi networks are protected, we all by negligence or compellingly use unprotected or poorly protected Wi-Fi networks, making it possible for attackers to collect ...
Andy Amoordon   +2 more
openaire   +1 more source

Man in the Middle Attack Mitigation in LoRaWAN

2020 International Conference on Inventive Computation Technologies (ICICT), 2020
LoRaWAN is a protocol for wireless communication related to the Internet of Things (IoT), that belongs to the Low Power Wide Area Network (LPWAN) protocol family. LoRa technology is used for communication to long distances at a low cost of power consumption.
John Thomas   +3 more
openaire   +1 more source

A man-in-the-middle attack on UMTS

Proceedings of the 3rd ACM workshop on Wireless security, 2004
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows an intruder to impersonate a valid GSM base station to a UMTS subscriber regardless of the fact that UMTS authentication and key agreement are used.
Ulrike Meyer, Susanne Wetzel
openaire   +1 more source

Man-in-the-Middle Attack Prevention

2021
Man-in-the-Middle is the one thing that breaks the security paradigm for encrypted data in transit. It can raise significant doubts in the minds of customers about a company’s ability to secure customer data in transit. This chapter discusses Man-in-the-Middle At-tack Prevention through the protection schemes of client and server certificate pinning ...
openaire   +1 more source

Man-in-the-Middle Attacks Evolved... but Our Security Models Didn’t

2017
The security community seems to be thoroughly familiar with man-in-the-middle attacks. However, the common perception of this type of attack is outdated. It originates from when network connections were fixed, not mobile, before 24/7 connectivity became ubiquitous.
Jonker, Hugo   +2 more
openaire   +2 more sources

Man-in-the-middle attack in HTTP/2

2017 International Conference on Intelligent Computing and Control (I2C2), 2017
Hyper Text Transfer Protocol Version 2 (HTTP/2) is the upgrade to the popularly used HTTP/1.1. This protocol has been created to enhance the already existing services and applications based on the older protocol with few modifications and rewriting. Thus, this has opened up to new possible vulnerabilities and attacks on them. HTTP/2 relies on Transport
Parth Patni   +4 more
openaire   +1 more source

Man-in-the-Middle Attack to the HTTPS Protocol

IEEE Security & Privacy Magazine, 2009
Web-based applications rely on the HTTPS protocol to guarantee privacy and security in transactions ranging from home banking, e-commerce, and e-procurement to those that deal with sensitive data such as career and identity information. Users trust this protocol to prevent unauthorized viewing of their personal, financial, and confidential information ...
CALLEGATI, FRANCO   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy