2018
DOI: 10.48550/arxiv.1803.02560
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…As a result, a recent research trend for securing surveillance systems has been the use of advanced anomaly detection. With anomaly detection researchers are able to identify manin-the-middle-attacks [20], video injection, OS fingerprinting, fuzzing and ARP poisoning attacks [27], and DDoS attacks [28].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a result, a recent research trend for securing surveillance systems has been the use of advanced anomaly detection. With anomaly detection researchers are able to identify manin-the-middle-attacks [20], video injection, OS fingerprinting, fuzzing and ARP poisoning attacks [27], and DDoS attacks [28].…”
Section: Discussionmentioning
confidence: 99%
“…When the video content is altered the watermark is significantly affected which alerts the receiver. To detect an eavesdropper or the presence of a third party with the ability to manipulate traffic, one can perform echo analysis to detect when malicious parties intercept traffic [20].…”
Section: Defense Against Mitm Attacksmentioning
confidence: 99%