Results 171 to 180 of about 13,174 (191)
Some of the next articles are maybe not open access.
Domain Validation++ For MitM-Resilient PKI
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a weak off-path attacker can effectively subvert the trustworthiness of popular commercially used CAs.
Markus Brandt +4 more
openaire +1 more source
Cecoin: A decentralized PKI mitigating MitM attacks
Future Generation Computer Systems, 2020Abstract For numerous applications, it is essential to reliably link a public key with its owner. The current solution is to employ the well-known Public Key Infrastructure (PKI), represented by a trusted certificate authority (CA), to fulfill this assignment by signing the certificate for the public key after validating its owner.
Bo Qin +5 more
openaire +1 more source
Определение MITM-атак посредством машинного обучения
2021Активное использование корпоративных сетей на предприятиях и бесплатных VPN-сервисов создает благодатную почву для MITM-атак, позволяющих перехватить и скомпрометировать входящий и исходящий сетевой трафик. Атаки Man-In-The-Middle подразумевают разнообразный спектр атак, таких как отравление кешей сетевых устройств, атаки на SSL-сертификаты/Content ...
openaire +1 more source
Generalized MitM attacks on full TWINE
Information Processing Letters, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tolba, Mohamed, Youssef, Amr M.
openaire +1 more source
Journal of Information Security and Applications, 2018
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney +2 more
openaire +1 more source
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney +2 more
openaire +1 more source
Ortadaki Adam Saldırısı (MITM)
2022Yaşadığımız çağın en hayati kaynağının bilgi olduğunu herkes kabul etmiştir. Bilgi her geçen gün daha fazla güç faktörü olarak hissedilirken, düşünme ve algılama biçimlerimizde, araştırma yöntemlerimizde ve yaşam tarzlarımızda büyük değişiklikler meydana gelmektedir.
openaire +1 more source
Unveiling SSL/TLS MITM Hosts in the Wild
2020 IEEE 3rd International Conference on Information Systems and Computer Aided Education (ICISCAE), 2020The SSL man-in-the-middle (MITM) attack uses forged X.509 certificates to impersonate each endpoint and intercept encrypted connections between clients and servers. Prior researches have revealed the prevalence of MITM attacks from SSL proxies, firewall, anti-virus, adware and malware.
Zhen Li, Gang Xiong, Li Guo
openaire +1 more source
Model of Information Technology Management - MITM
2014The starting point in developing a new approach for the selection of information technology is the principle of incompatibility by L.A. Zadeh [59], mentioned in Chapter 1, which refers to the possibility of modelling complex systems. Following this principle, the models presented in this work have been developed maintaining the necessary precision ...
Zdzisław Kowalczuk, Cezary Orłowski
openaire +1 more source
Countering MitM Attacks Using Evolved PathFinder Algorithm
International Journal of Cloud Applications and Computing, 2017In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths.
Mouhcine Chliah +2 more
openaire +1 more source
Detection MITM Attack in Multi-SDN Controller
2018 IEEE 5th International Congress on Information Science and Technology (CiSt), 2018Software Defined Security Networking is a new method to reduce risks while ensuring maximum protection for users and networks. It offers automated and usable intelligence to preserve the security of the systems. However, we have a variety of threats targeted to the plane and interface of SDN.
Anass Sebbar +3 more
openaire +1 more source

