Man in the Middle Attacks: Analysis, Motivation and Prevention
暂无分享,去创建一个
D Javeed | U MohammedBadamasi | CO Ndubuisi | F Soomro | M Asif | D. Javeed | U. MohammedBadamasi | C. Ndubuisi | F. Soomro | M. Asif
[1] Xiapu Luo,et al. A Centralized Monitoring Infrastructure for Improving DNS Security , 2010, RAID.
[2] Amir Herzberg,et al. Antidotes for DNS Poisoning by Off-Path Adversaries , 2012, 2012 Seventh International Conference on Availability, Reliability and Security.
[3] Dongwon Kim,et al. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks , 2010, IEEE Communications Letters.
[4] Ijaz Ahmad,et al. An Efficient Approach of Threat Hunting Using Memory Forensics , 2020 .
[5] Mauro Conti,et al. A Survey of Man In The Middle Attacks , 2016, IEEE Communications Surveys & Tutorials.
[6] Liang Hu,et al. Defense against DNS Man-In-The-Middle Spoofing , 2011, WISM.
[7] Xin Liu,et al. Passport: Secure and Adoptable Source Authentication , 2008, NSDI.
[8] Hung-Min Sun,et al. DepenDNS: Dependable Mechanism against DNS Cache Poisoning , 2009, CANS.
[9] Young-Gab Kim,et al. ASA: Agent-based secure ARP cache management , 2012, IET Commun..
[10] Cristina L. Abad,et al. An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).