Mallik et al., 2019 - Google Patents
Understanding Man-in-the-middle-attack through Survey of LiteratureMallik et al., 2019
View PDF- Document ID
- 688380289646278524
- Author
- Mallik A
- Ahsan A
- Shahadat M
- Tsou J
- Publication year
- Publication venue
- Indonesian Journal of Computing, Engineering, and Design
External Links
Snippet
In cryptography and PC security, a man-inthe-middle attack (MITM) is an attack where the attacker furtively transfers and perhaps changes the correspondence between two parties who trust they are straightforwardly communicating with each other. A man in the middle …
- 238000004891 communication 0 description 24
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/083—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords
- H04L63/0838—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using passwords using one-time-passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/126—Applying verification of the received information the source of the received data
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mallik | Man-in-the-middle-attack: Understanding in simple words | |
US8423768B2 (en) | Method for controlling the location information for authentication of a mobile station | |
Kambourakis et al. | DoS attacks exploiting signaling in UMTS and IMS | |
Rahman et al. | Security in wireless communication | |
Singh et al. | On the IEEE 802.11 i security: a denial‐of‐service perspective | |
Park et al. | Session management for security systems in 5g standalone network | |
Mallik et al. | Understanding Man-in-the-middle-attack through Survey of Literature | |
Rahman et al. | Security attacks on wireless networks and their detection techniques | |
Traynor et al. | Security for telecommunications networks | |
Pavia et al. | The evolution and future perspective of security in mobile communications networks | |
Abdul-Mumin | Detection of man-in-the-middle attack in IEEE 802.11 networks | |
Sharma et al. | A review on wireless network security | |
Lee et al. | Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network | |
Kellermann | Mobile risk management: e-finance in the wireless environment | |
Bocan et al. | Threats and Countermeasures in GSM Networks. | |
Pashalidis et al. | Using GSM/UMTS for single sign-on | |
Kambourakis et al. | Signaling-oriented DoS attacks in UMTS networks | |
Ouaissa et al. | Group access authentication of machine to machine communications in LTE networks | |
Sharp | Network Security | |
Maple et al. | Choosing the right wireless LAN security protocol for the home and business user | |
Sher et al. | 3G-WLAN convergence: Vulnerability, attacks possibilities and security model | |
Dwiputriane et al. | Authentication for 5G Mobile Wireless Networks: Manuscript Received: 5 January 2022, Accepted: 8 February 2022, Published: 15 March 2022 | |
Shree et al. | Security challenges in mobile communication networks | |
Karimli | Cloud Risks and Solutions Review | |
Luna | Man-in-the–Middle Attack |