A survey of man in the middle attacks

M Conti, N Dragoni, V Lesyk - IEEE communications surveys & …, 2016 - ieeexplore.ieee.org
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …

Comparative analysis of control plane security of SDN and conventional networks

AR Abdou, PC Van Oorschot… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Software defined networking implements the network control plane in an external entity,
rather than in each individual device as in conventional networks. This architectural …

Hijacking bitcoin: Routing attacks on cryptocurrencies

M Apostolaki, A Zohar… - 2017 IEEE symposium on …, 2017 - ieeexplore.ieee.org
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for
attackers. While many attack vectors have already been uncovered, one important vector …

DRRS-BC: Decentralized routing registration system based on blockchain

H Lu, Y Tang, Y Sun - IEEE/CAA Journal of Automatica Sinica, 2021 - ieeexplore.ieee.org
The border gateway protocol (BGP) has become the indispensible infrastructure of the
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …

{RAPTOR}: Routing attacks on privacy in tor

Y Sun, A Edmundson, L Vanbever, O Li… - 24th USENIX Security …, 2015 - usenix.org
The Tor network is a widely used system for anonymous communication. However, Tor is
known to be vulnerable to attackers who can observe traffic at both ends of the …

A survey of BGP security issues and solutions

K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …

System and method for enabling unconfigured devices to join an autonomic network in a secure manner

S Bjarnason, MH Behringer, YFE Hertoghs… - US Patent …, 2015 - Google Patents
(57) ABSTRACT A method in an example embodiment includes creating an initial
information package for a device in a domain of a network environment when the device is …

[图书][B] New dimensions of information warfare

R Di Pietro, S Raponi, M Caprolu, S Cresci, R Di Pietro… - 2021 - Springer
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …

The state of affairs in BGP security: A survey of attacks and defenses

A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …

Losing control of the internet: using the data plane to attack the control plane

M Schuchard, A Mohaisen, D Foo Kune… - Proceedings of the 17th …, 2010 - dl.acm.org
In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST,
attack, a distributed denial of service attack that attacks the control plane of the Internet …