A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Accountable algorithms

JA Kroll - 2015 - search.proquest.com
Important decisions about people are increasingly made by algorithms: Votes are counted;
voter rolls are purged; financial aid decisions are made; taxpayers are chosen for audits; air …

Man-in-the-middle-attack: Understanding in simple words

A Mallik - Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2019 - jurnal.ar-raniry.ac.id
These days cyber-attack is a serious criminal offense and it is a hot debated issue moreover.
A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters …

Bohatei: Flexible and elastic {DDoS} defense

SK Fayaz, Y Tobioka, V Sekar, M Bailey - 24th USENIX security …, 2015 - usenix.org
DDoS defense today relies on expensive and proprietary hardware appliances deployed at
fixed locations. This introduces key limitations with respect to flexibility (eg, complex routing …

Pisces: A programmable, protocol-independent software switch

M Shahbaz, S Choi, B Pfaff, C Kim, N Feamster… - Proceedings of the …, 2016 - dl.acm.org
Hypervisors use software switches to steer packets to and from virtual machines (VMs).
These switches frequently need upgrading and customization—to support new protocol …

The crossfire attack

MS Kang, SB Lee, VD Gligor - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
We present the Crossfire attack--a powerful attack that degrades and often cuts off network
connections to a variety of selected server targets (eg, servers of an enterprise, a city, a …

A stealthier partitioning attack against bitcoin peer-to-peer network

M Tran, I Choi, GJ Moon, AV Vu… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Network adversaries, such as malicious transit autonomous systems (ASes), have been
shown to be capable of partitioning the Bitcoin's peer-to-peer network via routing-level …

Mobilityfirst: a robust and trustworthy mobility-centric architecture for the future internet

D Raychaudhuri, K Nagaraja… - ACM SIGMOBILE Mobile …, 2012 - dl.acm.org
This paper presents an overview of the MobilityFirst network architecture, currently under
development as part of the US National Science Foundation's Future Internet Architecture …

Unveiling the mystery of internet packet forwarding: A survey of network path validation

K Bu, A Laird, Y Yang, L Cheng, J Luo, Y Li… - ACM Computing Surveys …, 2020 - dl.acm.org
Validating the network paths taken by packets is critical in constructing a secure Internet
architecture. Any feasible solution must both enforce packet forwarding along end-host …

Security of software defined networks: A survey

I Alsmadi, D Xu - Computers & security, 2015 - Elsevier
Abstract Software Defined Networking (SDN) has emerged as a new network architecture for
dealing with network dynamics through software-enabled control. While SDN is promoting …