Results 11 to 20 of about 8,344 (213)

Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2022
Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as
Hartina Hiromi Satyanegara   +1 more
doaj   +1 more source

New attacks against reduced Rijndael‐160

open access: yesIET Information Security, 2022
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj   +1 more source

D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing

open access: yesIEEE Access, 2022
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj   +1 more source

Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm

open access: yesIEEE Access, 2020
Meet in the middle (MITM) attack is one of the most important and applicable methods for cryptanalysis of block ciphers. In this paper, a more generalized method for MITM attack is considered.
Siavash Ahmadi, Mohammad Reza Aref
doaj   +1 more source

Simplified Modeling of MITM Attacks for Block Ciphers: New (Quantum) Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The meet-in-the-middle (MITM) technique has led to many key-recovery attacks on block ciphers and preimage attacks on hash functions. Nowadays, cryptographers use automatic tools that reduce the search of MITM attacks to an optimization problem. Bao et al. (EUROCRYPT 2021) introduced a low-level modeling based on Mixed Integer Linear Programming (MILP)
Schrottenloher, André, Stevens, Marc
openaire   +4 more sources

Anomaly Detection for Modbus over TCP in Control Systems Using Entropy and Classification-Based Analysis

open access: yesJournal of Cybersecurity and Privacy, 2023
This article presents a statistical approach using entropy and classification-based analysis to detect anomalies in industrial control systems traffic. Several statistical techniques have been proposed to create baselines and measure deviation to detect ...
Tirthankar Ghosh   +4 more
doaj   +1 more source

A Hybrid of Dual and Meet-in-the-Middle Attack on Sparse and Ternary Secret LWE

open access: yesIEEE Access, 2019
The dual attack is one of the most efficient attack algorithms for learning with errors (LWE) problem. Recently, an efficient variant of the dual attack for sparse and small secret LWE was reported by Albrecht (Eurocrypt 2017), which forces some LWE ...
Jung Hee Cheon   +3 more
doaj   +1 more source

Techno-Economic Aspect of the Man-in-the-Middle Attacks

open access: yesCommunications, 2017
This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses.
Zoran Cekerevac   +3 more
doaj   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Security by Spatial Reference:Using Relative Positioning to Authenticate Devices for Spontaneous Interaction [PDF]

open access: yes, 2007
Spontaneous interaction is a desirable characteristic associated with mobile and ubiquitous computing. The aim is to enable users to connect their personal devices with devices encountered in their environment in order to take advantage of interaction ...
C. Gehrmann   +13 more
core   +1 more source

Home - About - Disclaimer - Privacy