[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Mallik et al., 2019 - Google Patents

Understanding Man-in-the-middle-attack through Survey of Literature

Mallik et al., 2019

View PDF
Document ID
688380289646278524
Author
Mallik A
Ahsan A
Shahadat M
Tsou J
Publication year
Publication venue
Indonesian Journal of Computing, Engineering, and Design

External Links

Snippet

In cryptography and PC security, a man-inthe-middle attack (MITM) is an attack where the attacker furtively transfers and perhaps changes the correspondence between two parties who trust they are straightforwardly communicating with each other. A man in the middle …
Continue reading at pdfs.semanticscholar.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/083Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
    • H04L63/0838Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Mallik Man-in-the-middle-attack: Understanding in simple words
US8423768B2 (en) Method for controlling the location information for authentication of a mobile station
Kambourakis et al. DoS attacks exploiting signaling in UMTS and IMS
Rahman et al. Security in wireless communication
Singh et al. On the IEEE 802.11 i security: a denial‐of‐service perspective
Park et al. Session management for security systems in 5g standalone network
Mallik et al. Understanding Man-in-the-middle-attack through Survey of Literature
Rahman et al. Security attacks on wireless networks and their detection techniques
Traynor et al. Security for telecommunications networks
Pavia et al. The evolution and future perspective of security in mobile communications networks
Abdul-Mumin Detection of man-in-the-middle attack in IEEE 802.11 networks
Sharma et al. A review on wireless network security
Lee et al. Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network
Kellermann Mobile risk management: e-finance in the wireless environment
Bocan et al. Threats and Countermeasures in GSM Networks.
Pashalidis et al. Using GSM/UMTS for single sign-on
Kambourakis et al. Signaling-oriented DoS attacks in UMTS networks
Ouaissa et al. Group access authentication of machine to machine communications in LTE networks
Sharp Network Security
Maple et al. Choosing the right wireless LAN security protocol for the home and business user
Sher et al. 3G-WLAN convergence: Vulnerability, attacks possibilities and security model
Dwiputriane et al. Authentication for 5G Mobile Wireless Networks: Manuscript Received: 5 January 2022, Accepted: 8 February 2022, Published: 15 March 2022
Shree et al. Security challenges in mobile communication networks
Karimli Cloud Risks and Solutions Review
Luna Man-in-the–Middle Attack