A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
Comparative analysis of control plane security of SDN and conventional networks
AR Abdou, PC Van Oorschot… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Software defined networking implements the network control plane in an external entity,
rather than in each individual device as in conventional networks. This architectural …
rather than in each individual device as in conventional networks. This architectural …
Hijacking bitcoin: Routing attacks on cryptocurrencies
M Apostolaki, A Zohar… - 2017 IEEE symposium on …, 2017 - ieeexplore.ieee.org
As the most successful cryptocurrency to date, Bitcoin constitutes a target of choice for
attackers. While many attack vectors have already been uncovered, one important vector …
attackers. While many attack vectors have already been uncovered, one important vector …
DRRS-BC: Decentralized routing registration system based on blockchain
The border gateway protocol (BGP) has become the indispensible infrastructure of the
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …
Internet as a typical inter-domain routing protocol. However, it is vulnerable to …
{RAPTOR}: Routing attacks on privacy in tor
The Tor network is a widely used system for anonymous communication. However, Tor is
known to be vulnerable to attackers who can observe traffic at both ends of the …
known to be vulnerable to attackers who can observe traffic at both ends of the …
A survey of BGP security issues and solutions
K Butler, TR Farley, P McDaniel… - Proceedings of the …, 2009 - ieeexplore.ieee.org
As the Internet's de facto interdomain routing protocol, the Border Gateway Protocol (BGP) is
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
the glue that holds the disparate parts of the Internet together. A major limitation of BGP is its …
System and method for enabling unconfigured devices to join an autonomic network in a secure manner
S Bjarnason, MH Behringer, YFE Hertoghs… - US Patent …, 2015 - Google Patents
(57) ABSTRACT A method in an example embodiment includes creating an initial
information package for a device in a domain of a network environment when the device is …
information package for a device in a domain of a network environment when the device is …
[图书][B] New dimensions of information warfare
Since the dawn of Humanity, the progress machine tirelessly introduced tools and resources
that facilitated our everyday tasks. Over the years, new technologies have continually …
that facilitated our everyday tasks. Over the years, new technologies have continually …
The state of affairs in BGP security: A survey of attacks and defenses
A Mitseva, A Panchenko, T Engel - Computer Communications, 2018 - Elsevier
Abstract The Border Gateway Protocol (BGP) is the de facto standard interdomain routing
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
protocol. Despite its critical role on the Internet, it does not provide any security guarantees …
Losing control of the internet: using the data plane to attack the control plane
In this work, we introduce the Coordinated Cross Plane Session Termination, or CXPST,
attack, a distributed denial of service attack that attacks the control plane of the Internet …
attack, a distributed denial of service attack that attacks the control plane of the Internet …