Results 91 to 100 of about 8,344 (213)
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
We show generic attacks on unbalanced Feistel ciphers based on the meet-in-the-middle technique. We analyze two general classes of unbalanced Feistel structures, namely contracting Feistels and expanding Feistels.
Jian Guo +3 more
doaj +1 more source
Real-Time Detection and Identification of ARP Spoofing Attacks in Microgrids
The integration of smart devices and advanced communication infrastructure has turned power systems into cyber-physical systems (CPS), introducing cyber vulnerabilities. One such vulnerability arises from the use of the address resolution protocol (ARP),
Kalinath Katuri +2 more
doaj +1 more source
From Physical to Cyber: Escalating Protection for Personalized Auto Insurance
Nowadays, auto insurance companies set personalized insurance rate based on data gathered directly from their customers' cars. In this paper, we show such a personalized insurance mechanism -- wildly adopted by many auto insurance companies -- is ...
Aggarwal C. C. +12 more
core +2 more sources
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION [PDF]
Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to ...
Pratik Kumar Swain +2 more
doaj +1 more source
HIDING BEHIND THE CLOUDS: EFFICIENT, PRIVACY-PRESERVING QUERIES VIA CLOUD PROXIES [PDF]
This project proposes PriView, a privacy-preserving technique for querying third-party ser- vices from mobile devices. Classical private information retrieval (PIR) schemes are diffi- cult to deploy and use, since they require the target service to be ...
Gaur, Surabhi
core +1 more source
The Internet of Things (IoT) revolutionizes connectivity but introduces significant security challenges, particularly concerning man-in-the-middle (MitM) attacks.
Muhanna Ahmed Ali +1 more
doaj +1 more source
Networked Control of a Small Drone Resilient to Cyber Attacks
With increasing advances in networked systems and networked control systems in everyday life, the problem of cybersecurity becomes crucial. Moreover, in some applications like small UAVs, the safety and integrity of the system and its surroundings are ...
Octavian Ștefan, Alexandru Codrean
doaj +1 more source
Mosul University WLAN Security: Evaluation, Analysis and Improvement [PDF]
In this paper, Mosul University Wireless Local Area Networ (MUWLAN) security will be evaluated. The evaluation was made to test the confidentiality, integrity and availability of the MUWLAN.
Omar Ahmed Hachum
doaj
The present era is characterized by the interconnection, communication, connectivity, and data exchange of Internet of Things (IoT) devices. However, current systems often neglect to incorporate security protocols for IoT devices in the energy sector ...
Qazi Waqas Khan +5 more
doaj +1 more source
Man In The Middle (Mitm) Attack Detection Tool Design
Man in the Middle (MITM) attack is aimed at seizing data between two nodes. The ARP Spoofing/Poisoning technique is a technique frequently used by attackers which allows MITM attacks to be carried out on local area networks (LANs). The attack exploits the vulnerabilities of ARP, which is a stateless protocol.
openaire +1 more source

