2020
DOI: 10.13052/jcsm2245-1439.933
|View full text |Cite
|
Sign up to set email alerts
|

Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat

Abstract: Network security and related issues have been discussed thoroughly in this paper, especially at transport layer security network protocol, which concern with confidentiality, integrity, availability, authentication, and accountability. To mitigate and defeat Man-in-the-middle-attacks, we have proposed a new model which consists of sender and receiver systems and utilizes a combination of blowfish (BF) and Advanced Encryption Standard (AES) algorithms, symmetric key agreement to distribute public keys, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 20 publications
0
10
0
Order By: Relevance
“…This is one of the downsides of the TLS protocol. In addition, TLS has the potential to be susceptible to man-in-themiddle (MiTM) attacks [182]. However, TLS can also increase the processing overhead and communication latency, which may be problematic in resource-constrained IoT devices with limited processing power and battery life.…”
Section: Transport Layer Security (Tls)mentioning
confidence: 99%
“…This is one of the downsides of the TLS protocol. In addition, TLS has the potential to be susceptible to man-in-themiddle (MiTM) attacks [182]. However, TLS can also increase the processing overhead and communication latency, which may be problematic in resource-constrained IoT devices with limited processing power and battery life.…”
Section: Transport Layer Security (Tls)mentioning
confidence: 99%
“…Security issues at the transport layer encompass a wide range of threats, including session hijacking, man-in-the-middle attacks, and denial-of-service (DoS) attacks. TCP/IP protocols like TCP and UDP are vulnerable to these attacks due to their connection-oriented and connectionless nature, respectively [184]- [187]. TCP-based attacks, such as SYN flooding and TCP reset attacks, exploit weaknesses in the TCP handshake process to overwhelm target systems with a high volume of malicious traffic, causing service disruptions or denial of service.…”
Section: Traffic Analysismentioning
confidence: 99%
“…Alwazzeh et al [15] the researchers developed a novel model comprising two sender and receiver systems in order to counter MITM attacks, specifically using the public key environment and the private key to enhance the system"s performance, as well as improve the efficiency, reliability, and confidentiality of the server-client data transfer. Public and private key creation and distribution is carried out using ECC and Diff-Helman cryptography, hybrid AES and Blowfish encryption, in addition to ECDS and SHA-256 authentication and integration.…”
Section: Related Workmentioning
confidence: 99%