2017
DOI: 10.4018/ijcac.2017040104
|View full text |Cite
|
Sign up to set email alerts
|

Countering MitM Attacks Using Evolved PathFinder Algorithm

Abstract: In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths. Doing so, we'll ensure that an attacker will not be able to get hands on the entire message being transmitted. So, in this paper, we'll start by recalling the first version of pathfinder algorithm, followed by an introduction to the newest release that allows us… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
2
0
Order By: Relevance
“…Chliah et al [24] presented a method for defending SDN networks against MitM attacks. In their solution, both SDN and MPTCP have been implemented.…”
Section: Figure 2 Fog Computing Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Chliah et al [24] presented a method for defending SDN networks against MitM attacks. In their solution, both SDN and MPTCP have been implemented.…”
Section: Figure 2 Fog Computing Threat Modelmentioning
confidence: 99%
“…MTD approach seeks to change the target attack surface continually and randomly (by changing the flows routes, IP addresses, and port numbers). Multipath routing [17], [18] is an existing technique that permits the simultaneous use of many routes in a network. It is worth mentioning that recent edge devices (e.g., mobile devices) had various network interfaces, including Wi-Fi and cellular that allowed the adoption of this multipath routing.…”
Section: Introductionmentioning
confidence: 99%