Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

Deep Insight into IoT‐Enabled Agriculture and Network Protocols

MZ Hasan, ZM Hanapi, MZ Hussain… - Wireless …, 2022 - Wiley Online Library
In recent years, research has combined the connection of agricultural equipment to increase
crop growth rates and lower planting costs by refining the entire planting process. IT …

[PDF][PDF] 云应用程序编程接口安全研究综述: 威胁与防护

陈真, 乞文超, 贺鹏飞, 刘林林, 申利民 - 电子与信息学报, 2023 - jeit.ac.cn
云时代, 云应用程序编程接口(API) 是服务交付, 能力复制和数据输出的最佳载体. 然而, 云API
在开放服务和数据的同时, 增加了暴露面和攻击面, 攻击者通过数据劫持和流量分析等技术获取 …

Securing ARP and DHCP for mitigating link layer attacks

OS Younes - Sādhanā, 2017 - Springer
Network security has become a concern with the rapid growth and expansion of the Internet.
While there are several ways to provide security for communications at the application …

Resource-efficient routing and scheduling of time-constrained network-on-chip communication

S Stuijk, T Basten, M Geilen… - … on Digital System …, 2006 - ieeexplore.ieee.org
Network-on-chip-based multiprocessor systems-on-chip are considered as future embedded
systems platforms. One of the steps in mapping an application onto such a parallel platform …

Improvement of address resolution security in IPv6 local network using trust-ND

S Praptodiyono, IH Hasbullah, M Anbar… - … Journal of Electrical …, 2015 - journal.esperg.com
Abstract The current Internet infrastructure IPv4 uses Address Resolution Protocol to resolve
the neighbors MAC address if not known. IPv6 is the next generation communication …

A survey for cloud application programming interface security: threats and protection

Z CHEN, W QI, P HE, L LIU, L SHEN - 电子与信息学报, 2023 - jeit.ac.cn
In the cloud era, cloud Application Programming Interface (API) is the best carrier for service
delivery, capability replication and data output. However, cloud API increases the exposure …

[PDF][PDF] A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux

M Dandotiya, AS Dandotiya, N Dandotiya… - Int J Res Appl Sci Eng …, 2022 - academia.edu
Currently, the Internet is playing a vital role in educating students to boost industrial
production. Various network components are employed to give a wide range of options and …

Shadow APR-ing for APR Poisoning Detection

D Majumdar, RR Chintala - 2023 9th International Conference …, 2023 - ieeexplore.ieee.org
The Address Resolution Protocol (ARP) is a part of today's networking which is used for IP-to-
MAC address mapping. In the'90s ARP was designed for speed not for security. As a result …

Design and implementation of a mechanism to identify and defend against ARP spoofing

M Sharma, S Ravichandra - 2023 14th International …, 2023 - ieeexplore.ieee.org
One of the most frequently discussed computer security breaches is the Man-In-The-Middle
attack (MITM), which is causing significant worry among security professionals. Attackers …