Results 171 to 180 of about 13,174 (191)
Some of the next articles are maybe not open access.

Domain Validation++ For MitM-Resilient PKI

Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs.
Markus Brandt   +4 more
openaire   +1 more source

Cecoin: A decentralized PKI mitigating MitM attacks

Future Generation Computer Systems, 2020
Abstract For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner.
Bo Qin   +5 more
openaire   +1 more source

Определение MITM-атак посредством машинного обучения

2021
Активное использование корпоративных сетей на предприятиях и бесплатных VPN-сервисов создает благодатную почву для MITM-атак, позволяющих перехватить и скомпрометировать входящий и исходящий сетевой трафик. Атаки Man-In-The-Middle подразумевают разнообразный спектр атак, таких как отравление кешей сетевых устройств, атаки на SSL-сертификаты/Content ...
openaire   +1 more source

Generalized MitM attacks on full TWINE

Information Processing Letters, 2016
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tolba, Mohamed, Youssef, Amr M.
openaire   +1 more source

Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks

Journal of Information Security and Applications, 2018
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney   +2 more
openaire   +1 more source

Ortadaki Adam Saldırısı (MITM)

2022
Yaşadığımız çağın en hayati kaynağının bilgi olduğunu herkes kabul etmiştir. Bilgi her geçen gün daha fazla güç faktörü olarak hissedilirken, düşünme ve algılama biçimlerimizde, araştırma yöntemlerimizde ve yaşam tarzlarımızda büyük değişiklikler meydana gelmektedir.
openaire   +1 more source

Unveiling SSL/TLS MITM Hosts in the Wild

2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), 2020
The SSL man-in-the-middle (MITM) attack uses forged X.509 certificates to impersonate each endpoint and intercept encrypted connections between clients and servers. Prior researches have revealed the prevalence of MITM attacks from SSL proxies, firewall, anti-virus, adware and malware.
Zhen Li, Gang Xiong, Li Guo
openaire   +1 more source

Model of Information Technology Management - MITM

2014
The starting point in developing a new approach for the selection of information technology is the principle of incompatibility by L.A. Zadeh [59], mentioned in Chapter 1, which refers to the possibility of modelling complex systems. Following this principle, the models presented in this work have been developed maintaining the necessary precision ...
Zdzisław Kowalczuk, Cezary Orłowski
openaire   +1 more source

Countering MitM Attacks Using Evolved PathFinder Algorithm

International Journal of Cloud Applications and Computing, 2017
In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths.
Mouhcine Chliah   +2 more
openaire   +1 more source

Detection MITM Attack in Multi-SDN Controller

2018 IEEE 5th International Congress on Information Science and Technology (CiSt), 2018
Software Defined Security Networking is a new method to reduce risks while ensuring maximum protection for users and networks. It offers automated and usable intelligence to preserve the security of the systems. However, we have a variety of threats targeted to the plane and interface of SDN.
Anass Sebbar   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy