Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3470113
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(1 citation statement)
references
References 18 publications
0
1
0
Order By: Relevance
“…10. Brute force attack [38]: This attack occurs when a malicious attacker systematically attempts all possible combinations of a password or encryption key until the correct one is found. The attacker uses automated tools to generate and try every possible permutation, starting from the simplest and shortest, until gaining unauthorized access to the system or decrypting a message.…”
Section: Adversary Modelmentioning
confidence: 99%
“…10. Brute force attack [38]: This attack occurs when a malicious attacker systematically attempts all possible combinations of a password or encryption key until the correct one is found. The attacker uses automated tools to generate and try every possible permutation, starting from the simplest and shortest, until gaining unauthorized access to the system or decrypting a message.…”
Section: Adversary Modelmentioning
confidence: 99%