A novel algorithm to prevent man in the middle attack in LAN environment
Secure web sites usually use HTTPS connection to secure transactions such as money transactions, online payment, and e-commerce. The use of HTTPS gives a sense of protection against attacks such as man in the middle (MITM) attack. This paper analyzes HTTPS connections against MITM by simulating real...
| Main Authors: | Ahmed , Mohiuddin, Hazza, Muataz |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2010
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/13337/ http://irep.iium.edu.my/13337/1/A_Novel_Algorithm_to_Prevent_Man.pdf |
Similar Items
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN
by: Dar, Humaira, et al.
Published: (2013)
by: Dar, Humaira, et al.
Published: (2013)
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018)
by: Wen, Chuah Chai, et al.
Published: (2018)
Community Landslide Collaboration system (COL) for disaster prevention, mitigation and preparedness
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
iSpeechNews:s real time speech news service for ubiquitous computing environment
by: Mantoro, Teddy, et al.
Published: (2010)
by: Mantoro, Teddy, et al.
Published: (2010)
Improving the deployment of broadband content delivery using an open access approach in a high speed broadband environment in the Klang Valley
by: Ismail, Zahid
Published: (2011)
by: Ismail, Zahid
Published: (2011)
KAED LAN Room
by: Johari, Mohd Helmi, et al.
Published: (2017)
by: Johari, Mohd Helmi, et al.
Published: (2017)
Real-time MPEG-4 transmission over wireless LAN
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
by: Mohammed Jama, Abdirisaq, et al.
Published: (2011)
Backdoor attack detection based on stepping stone detection approach
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
by: Al-Minshid, Khalid Abdulrazzaq Abdulnabi
Published: (2014)
Web users’ knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
The mediating effect of teamwork toward organizational readiness for Business Intelligence (BI) implementation
by: Anjariny, Ahmed H., et al.
Published: (2016)
by: Anjariny, Ahmed H., et al.
Published: (2016)
The knowledge management strategies used as a tool within and through strategic consulting firms to increase the organisational performance
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2015)
Information security in ICT from an Islamic
perspective
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Distributed denial of service detection using stepping stone detection method in internet control message protocol attack
by: Nor Izham, Subri
Published: (2017)
by: Nor Izham, Subri
Published: (2017)
Report of job done on preventing ransomware virus attack to PC
by: Mustafa, mohd mizam, et al.
Published: (2017)
by: Mustafa, mohd mizam, et al.
Published: (2017)
e-Life web-based application of birth and death certificate
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011)
HajjLocator: a hajj pilgrimage tracking framework in crowded ubiquitous environment
by: Mantoro, Teddy, et al.
Published: (2011)
by: Mantoro, Teddy, et al.
Published: (2011)
An automatic diacritization algorithm for undiacritized Arabic text
by: Zayyan, Ayman Ahmad Muhammad
Published: (2017)
by: Zayyan, Ayman Ahmad Muhammad
Published: (2017)
Web-based e-learning systems acceptance and success: a review of contributing factors from the instructors’ perception
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
by: Oyefolahan, Ishaq Oyebisi, et al.
Published: (2014)
Positive impact of smartphone application: whatsapp &
facebook for online business
by: Ibrahim, Jamaludin, et al.
Published: (2014)
by: Ibrahim, Jamaludin, et al.
Published: (2014)
Mobile Quran app security vulnerabilities
by: Talib, Shuhaili, et al.
Published: (2015)
by: Talib, Shuhaili, et al.
Published: (2015)
The role of IT consulting practice: a successful enterprise mobility solution
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
by: Fakhri, Nurul Fahimah, et al.
Published: (2015)
Comparison of Business Model Canvas (BMC) among the three consulting companies
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2015)
Potential use of data mining techniques in information technology consulting operations
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
Information security aligned to enterprise management
by: Abdullah, Istikoma, et al.
Published: (2015)
by: Abdullah, Istikoma, et al.
Published: (2015)
How much privacy we still have on social network?
by: Chewae, Mafaisu, et al.
Published: (2015)
by: Chewae, Mafaisu, et al.
Published: (2015)
Enterprise information architecture of a Malaysian institute of higher learning management information system: an experience
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
by: Suhaimi, Mohd Adam, et al.
Published: (2014)
Privacy concern and perceived benefits towards privacy and election in Indonesia
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Steganography: a review of information security research and development in Muslim world
by: Yunus, Yunura Azura, et al.
Published: (2013)
by: Yunus, Yunura Azura, et al.
Published: (2013)
Decision to cast a vote: an ordinal regression statistical analysis
by: Lubis, Muharman, et al.
Published: (2014)
by: Lubis, Muharman, et al.
Published: (2014)
Designing persuasive application to encourage physical activity at workplace among older workers
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
A study of smartphone usage and barriers among the elderly
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
by: Mohd Mohadis, Hazwani, et al.
Published: (2014)
Using socio-ecological model to inform the design of persuasive applications
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
by: Mohd Mohadis, Hazwani, et al.
Published: (2015)
Motivators and barriers for physical activity in older workers: a socio-ecological exploration
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
by: Mohd Mohadis, Hazwani, et al.
Published: (2016)
Knowledge management practice in private sector: building
the way for Saudi Arabia strategic growth and transformation to knowledge-based economy
by: Gharamah, Abdulrahman, et al.
Published: (2018)
by: Gharamah, Abdulrahman, et al.
Published: (2018)
Impersonate affecting users' attitude toward facebook in Egypt
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
by: Hassan El Hoby, Hany Mohamed, et al.
Published: (2016)
Multi-layered alert filtration and feedback cycle using Brahms model
by: Ghaffar, Abid, et al.
Published: (2016)
by: Ghaffar, Abid, et al.
Published: (2016)
Scale free network analysis of a large crowd through their
spatio-temporal activities
by: Ahmad, Akhlaq, et al.
Published: (2016)
by: Ahmad, Akhlaq, et al.
Published: (2016)
Similar Items
-
Evaluating the effect of using IP version and physical media on the ICMP throughput of a LAN
by: Dar, Humaira, et al.
Published: (2013) -
Analysis of four historical ciphers against known plaintext frequency statistical attack
by: Wen, Chuah Chai, et al.
Published: (2018) -
Community Landslide Collaboration system (COL) for disaster prevention, mitigation and preparedness
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011) -
Real time information sharing and remote sensing for disaster management and prevention
by: Ahmad Dahlan, Abdul Rahman, et al.
Published: (2011) -
Mobile user location prediction: genetic algorithm-based approach
by: Mantoro, Teddy, et al.
Published: (2010)