scholarly journals BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection

Author(s):  
Muhammed Ali Yurdagul ◽  
Husrev Taha Sencar
Author(s):  
James Jin Kang ◽  
Kiran Fahd ◽  
Sitalakshmi Venkatraman ◽  
Rolando Trujillo-Rasua ◽  
Paul Haskell-Dowland

2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Robert A. Sowah ◽  
Kwadwo B. Ofori-Amanfo ◽  
Godfrey A. Mills ◽  
Koudjo M. Koumadi

A Mobile Ad-Hoc Network (MANET) is a convenient wireless infrastructure which presents many advantages in network settings. With Mobile Ad-Hoc Network, there are many challenges. These networks are more susceptible to attacks such as black hole and man-in-the-middle (MITM) than their corresponding wired networks. This is due to the decentralized nature of their overall architecture. In this paper, ANN classification methods in intrusion detection for MANETs were developed and used with NS2 simulation platform for attack detection, identification, blacklisting, and node reconfiguration for control of nodes attacked. The ANN classification algorithm for intrusion detection was evaluated using several metrics. The performance of the ANN as a predictive technique for attack detection, isolation, and reconfiguration was measured on a dataset with network-varied traffic conditions and mobility patterns for multiple attacks. With a final detection rate of 88.235%, this work not only offered a productive and less expensive way to perform MITM attacks on simulation platforms but also identified time as a crucial factor in determining such attacks as well as isolating nodes and reconfiguring the network under attack. This work is intended to be an opening for future malicious software time signature creation, identification, isolation, and reconfiguration to supplement existing Intrusion Detection Systems (IDSs).


Cryptography ◽  
2018 ◽  
Vol 2 (4) ◽  
pp. 38 ◽  
Author(s):  
James Jin Kang ◽  
Kiran Fahd ◽  
Sitalakshmi Venkatraman

Due to the prevalence and constantly increasing risk of cyber-attacks, new and evolving security mechanisms are required to protect information and networks and ensure the basic security principles of confidentiality, integrity, and availability—referred to as the CIA triad. While confidentiality and integrity can be achieved using Secure Sockets Layer (SSL)/Transport Layer Security (TLS) certificates, these depend on the correct authentication of servers, which could be compromised due to man-in-the-middle (MITM) attacks. Many existing solutions have practical limitations due to their operational complexity, deployment costs, as well as adversaries. We propose a novel scheme to detect MITM attacks with minimal intervention and workload to the network and systems. Our proposed model applies a novel inferencing scheme for detecting true anomalies in transmission time at a trusted time server (TTS) using time-based verification of sent and received messages. The key contribution of this paper is the ability to automatically detect MITM attacks with trusted verification of the transmission time using a learning-based inferencing algorithm. When used in conjunction with existing systems, such as intrusion detection systems (IDS), which require comprehensive configuration and network resource costs, it can provide a robust solution that addresses these practical limitations while saving costs by providing assurance.


2021 ◽  
Vol 2111 (1) ◽  
pp. 012054
Author(s):  
M.A. Hamid ◽  
S.A. Rahman ◽  
I.A. Darmawan ◽  
M. Fatkhurrokhman ◽  
M. Nurtanto

Abstract Testing the performance efficiency aspect was carried out to test the performance efficiency of the Unity 3D and Blender-based virtual laboratory media during the COVID-19 pandemic at the Electrical Engineering Vocational Laboratory. This test is carried out to test the performance of the media that has been created. The aspects tested are access speed, process speed, and simulation speed when run. Tests were conducted to measure processor and memory consumption through real time monitoring using MSI Afterburner. Divided into 2 stages of testing, namely time behavior and resource utilization. Time-behavior is focused on how long it takes the media or software to provide a response time to perform an action from a certain function. Resource-utilization is the degree to which software uses some resources when doing something under certain conditions.


2000 ◽  
Vol 75 (6) ◽  
pp. 247-253 ◽  
Author(s):  
Ing-Ray Chen ◽  
Ding-Chau Wang ◽  
Chih-Ping Chu

2019 ◽  
Vol 30 (7) ◽  
pp. 979-988 ◽  
Author(s):  
David DeSteno ◽  
Fred Duong ◽  
Daniel Lim ◽  
Shanyu Kates

Gratitude has been linked to behaviors involving the exchange of resources; it motivates people to repay debts to benefactors. However, given its links to self-control—itself a necessary factor for repaying debts—the possibility arises that gratitude might enhance other virtues unrelated to exchange that depend on an ability to resist temptation. Here, we examined gratitude’s ability to function as a “parent” virtue by focusing on its ability to reduce cheating. Using real-time behavior-based measures of cheating, we demonstrated that gratitude, as opposed to neutrality and the more general positive emotional state of happiness, reduces cheating in both a controlled laboratory setting ( N = 156) and a more anonymous online setting ( N = 141). This finding suggests that not all moral qualities need to be studied in silos but, rather, that hierarchies exist wherein certain virtues might give rise to seemingly unrelated others.


Sign in / Sign up

Export Citation Format

Share Document