Results 81 to 90 of about 409,625 (195)

Man in the middle attacks

open access: yes, 2020
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in
openaire   +1 more source

Educational and Laboratory System for Studying Man-in-the-Middle Attacks and Ways to Protect against Them

open access: yesБезопасность информационных технологий, 2018
For the implementation of the Master’s program “Business Continuity and Information Security Maintenance” in the field of specialty 10.04.01 “Information Security”, a software shell of the educational laboratory complex (ELC) designed to study the “Man ...
Alexander B. Sattarov   +1 more
doaj   +1 more source

Network security attacks. ARP Poisoning case study [PDF]

open access: yes
Arp poisoning is one of the most common attacks in a switched network. A switch is a network device that limits the ability of attackers that use a packet sniffer to gain access to information from internal network traffic.
Luminiţa DEFTA
core  

Quantum Hocus Pocus

open access: yes, 2016
The claims made in a manifesto resulting in the European quantum technologies flagship initiative in quantum technology and similar enterprises are taken as starting point to critically review some potential quantum resources, such as coherent ...
Svozil, Karl
core   +1 more source

Man-in-the-middle-attack: Understanding in simple words

open access: yesInternational Journal of Data and Network Science, 2019
De nos jours, la cyberattaque est une infraction pénale grave et c'est d'ailleurs une question très débattue.L' attaque de l'homme du milieu est une sorte de cyberattaque où un tiers non approuvé entre dans une correspondance en ligne entre deux utilisateurs, reste échappé aux deux parties.Le logiciel malveillant qui est dans l'attaque du milieu ...
Avijit Mallik   +3 more
openaire   +2 more sources

A Review of Man-in-the-Middle Attacks

open access: yes, 2015
This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session ...
openaire   +2 more sources

Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks

open access: yesJournal of Computer Systems, Networks, and Communications, 2010
In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks.
Mina Malekzadeh   +2 more
doaj   +1 more source

Chip and Skim: cloning EMV cards with the pre-play attack [PDF]

open access: yes, 2012
EMV, also known as "Chip and PIN", is the leading system for card payments worldwide. It is used throughout Europe and much of Asia, and is starting to be introduced in North America too. Payment cards contain a chip so they can execute an authentication
Anderson, Ross   +4 more
core   +1 more source

A Lightweight Chaotic Map-Based Key Agreement Scheme for the Advanced Metering Infrastructure

open access: yesApplied Sciences
In the advanced metering infrastructure (AMI), impersonation, eavesdropping, man-in-the-middle and other attacks occur in the process of communication between entities through public channels, which will lead to the leakage of user privacy or the ...
Baoyi Wang, Yaowei Feng, Shaomin Zhang
doaj   +1 more source

Federated learning-based hybrid convolutional recurrent neural network for multi-class intrusion detection in IoT networks

open access: yesDiscover Internet of Things
As Internet of Things (IoT) devices leads an significant challenges in securing the systems from cyber-attacks in large-scale IoT networks. Traditional methods faces struggle to precisely detecting the complex intrusion patterns due to the heterogeneity ...
Prabu Selvam   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy