A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Man-in-the-middle attack in wireless and computer networking—A review

B Bhushan, G Sahoo, AK Rai - 2017 3rd International …, 2017 - ieeexplore.ieee.org
One of the most discussed attacks in computer security is Man-In-The-Middle attack and it is
a serious concern for many security professionals. The attackers target the actual data …

[PDF][PDF] Needle in a haystack: Mitigating content poisoning in named-data networking

C Ghali, G Tsudik, E Uzun - … of NDSS workshop on security of …, 2014 - sprout.ics.uci.edu
Named-Data Networking (NDN) is a candidate next-generation Internet architecture
designed to address some limitations of the current IP-based Internet. NDN uses the pull …

A survey on security issues in services communication of Microservices‐enabled fog applications

D Yu, Y Jin, Y Zhang, X Zheng - Concurrency and Computation …, 2019 - Wiley Online Library
Fog computing is used as a popular extension of cloud computing for a variety of emerging
applications. To incorporate various design choices and customized policies in fog …

A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks

Y Li, L Zhu, H Wang, FR Yu, S Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
While communication-based train control (CBTC) systems play a crucial role in the efficient
and reliable operation of urban rail transits, its high penetration level of communication …

Comparative analysis of control plane security of SDN and conventional networks

AR Abdou, PC Van Oorschot… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Software defined networking implements the network control plane in an external entity,
rather than in each individual device as in conventional networks. This architectural …

Dual-state parametric eye tracking

Y Tian, T Kanade, JF Cohn - Proceedings Fourth IEEE …, 2000 - ieeexplore.ieee.org
Most eye trackers work well for open eyes. However blinking is a physiological necessity for
humans. More over, for applications such as facial expression analysis and driver …

D-arp: An efficient scheme to detect and prevent arp spoofing

SM Morsy, D Nashat - IEEE Access, 2022 - ieeexplore.ieee.org
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields
of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an …

Identifier binding attacks and defenses in {Software-Defined} networks

S Jero, W Koch, R Skowyra, H Okhravi… - 26th USENIX Security …, 2017 - usenix.org
In this work, we demonstrate a novel attack in SDN networks, Persona Hijacking, that breaks
the bindings of all layers of the networking stack and fools the network infrastructure into …

Ascertain the efficient machine learning approach to detect different ARP attacks

N Ahuja, G Singal, D Mukhopadhyay… - Computers and Electrical …, 2022 - Elsevier
Abstract Software-Defined Networking (SDN) is a programmable network architecture that
allows network devices to be controlled remotely, but it is still highly susceptible to traditional …