Results 131 to 140 of about 1,025 (182)
Some of the next articles are maybe not open access.
Generalized MitM attacks on full TWINE
Information Processing Letters, 2016zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Tolba, Mohamed, Youssef, Amr M.
openaire +1 more source
Countering MitM Attacks Using Evolved PathFinder Algorithm
International Journal of Cloud Applications and Computing, 2017In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths.
Mouhcine Chliah +2 more
openaire +1 more source
Detection MITM Attack in Multi-SDN Controller
2018 IEEE 5th International Congress on Information Science and Technology (CiSt), 2018Software Defined Security Networking is a new method to reduce risks while ensuring maximum protection for users and networks. It offers automated and usable intelligence to preserve the security of the systems. However, we have a variety of threats targeted to the plane and interface of SDN.
Anass Sebbar +3 more
openaire +1 more source
2013
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja +3 more
openaire +1 more source
Our MITM attacks on SSP, BT-Nino-MITM attack [2, 20], BT-SSP-OOB-MITM attack [2, 22], BT-SSP-Printer-MITM attack [2, 21], and BT-SSP-HS/HF-MITM attack [2, 22] as well as a SSP MITM attack of Suomalainen et al. [19], are described in Sect. 5.1. Section 5.2 provides a literature-review-based comparative analysis of the existing MITM attacks on Bluetooth ...
Keijo Haataja +3 more
openaire +1 more source
Desynchronization and MitM Attacks Against Neighbor Awareness Networking Using OpenNAN
Proceedings of the 19th ACM International Symposium on Mobility Management and Wireless Access, 2021The Neighbor Awareness Networking (NAN) specification, also known as Wi-Fi Aware, offers a quick and energy efficient way of forming wireless ad-hoc networks. It includes ranging capabilities based on Fine Timing Measurements (FTM) and can sustain connectivity to a Wi-Fi network while participating in a NAN cluster.
Lars Almon +3 more
openaire +1 more source
Security Analysis of MITM Attack on SCADA Network
2020Cybersecurity is one of the major concerns in the Supervisory Control and Data Acquisition Technique (SCADA) systems. The main goal of this paper is to check how secure the power SCADA System is? In SCADA systems, attackers either disable the system or attempt to damage the SCADA network by pushing out improper data or commands for disrupting ...
Debasish Deb +3 more
openaire +1 more source
Journal of Information Security and Applications, 2018
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney +2 more
openaire +1 more source
Abstract Securing user credentials against phishing attacks is an important and challenging research problem. These days phishing is carried out by real time (RT) and control relay (CR) man in the middle (MITM) attacks or by malicious browser extensions.
Gaurav Varshney +2 more
openaire +1 more source
Automation of MitM Attack on Wi-Fi Networks
2018Security mechanisms of wireless technologies often suffer weaknesses that can be exploited to perform Man-in-the-Middle attacks, allowing to eavesdrop or to spoof network communication. This paper focuses on possibilities of automation of these types of attacks using already available tools for specific tasks.
Martin Vondráček +2 more
openaire +1 more source
RokuControl-Conducting MITM Attacks on Roku
2022 IEEE 13th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), 2022Devin Coles +3 more
openaire +1 more source
Vulnerability analysis on Mobile VoIP supplementary services and MITM attack
2013 International Computer Science and Engineering Conference (ICSEC), 2013Mobile VoIP(mVoIP) is to provide Voice based telephony service using wired/wireless network on Smartphone. We can use several kinds of mVoIP services on smartphone such as the Supplementary Service registration / release process, coloring, call forwarding, absence guide, three-way calling, and simultaneous receipt.
You Joung Ham, Hyung-Woo Lee
openaire +1 more source

