2023
DOI: 10.32604/cmc.2023.037071
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Secure OpenID-Based EAAA Protocol to Prevent MITM and Phishing Attacks in Web Apps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…References MITM [22], [25], [26], [27], [28], [29], [31], [32], [33], [34], [35], [37], [41], [42], [43], [44], [45] Session Hijacking [23], [24], [26], [30], [31], [34], [35], [36], [37], [38], [39], [40], [46], [47], [48], [49], [50], [51] hijacking occurs during the HTTP session when the user gets its ID, whereas in-network layer interception occurs during TCP and User Datagram Protocol (UDP) sessions [48]. Fig.…”
Section: Attack Domainmentioning
confidence: 99%
See 3 more Smart Citations
“…References MITM [22], [25], [26], [27], [28], [29], [31], [32], [33], [34], [35], [37], [41], [42], [43], [44], [45] Session Hijacking [23], [24], [26], [30], [31], [34], [35], [36], [37], [38], [39], [40], [46], [47], [48], [49], [50], [51] hijacking occurs during the HTTP session when the user gets its ID, whereas in-network layer interception occurs during TCP and User Datagram Protocol (UDP) sessions [48]. Fig.…”
Section: Attack Domainmentioning
confidence: 99%
“…3) A way to hijack the network is the brute force method in which the hit-and-trial process overtakes login data, encryption keys, and other private information [50]. 4) Lastly, misdirecting interest works by diverting users' interest to other websites, thus gaining, and attaining their private information [51]. Table 11 summarizes all the session hijacking attacks that occur on the application and network layer of the TCP/IP…”
Section: Attack Domainmentioning
confidence: 99%
See 2 more Smart Citations