Essays about: "MITM"

Found 5 essays containing the word MITM.

  1. 1. Web-based prototype for protecting controllers from existing cyber-attacks in an industrial control system

    University essay from KTH/Medicinteknik och hälsosystem

    Author : Pa Sanyang; [2020]
    Keywords : ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS; ICS; SCADA; Modbus; Honeypot; Conpot; Cyber attacks; MITM; DoS; Flooding; Reverse proxy server; AWS;

    Abstract : Industrial control system or ICS is a critical part of the infrastructure in society. An example of ICS is the rail networks or energy plants like the nuclear plant. SCADA is an ICS system following a hierarchical structure. Due to the fact that a control system can be very large, monitoring remote through networks is an effective way to do so. READ MORE

  2. 2. Data tampering in Vehicle CAN Bus networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Elpidoforos Arapantonis; [2019]
    Keywords : Keywords: Automotive Cyber Security; CAN bus vulnerabilities; Raspberry Pi; Arduino; Instrument Cluster;

    Abstract : The paradigm of the automotive industry has changed, over the course of the last10-15 years. Electronics and software, have introduced in many dierents parts ofa vehicle and the drive-by-wire it is taking over the vehicle functions. Connectivityfunctionalities are increasing in the context of the automotive industry as well. READ MORE

  3. 3. A comparison of the security in ZigBee and the IEEE 802.15.9 standard and an experimental analysis of communication over IEEE 802.15.4

    University essay from Linköpings universitet/Institutionen för datavetenskap; Linköpings universitet/Institutionen för datavetenskap

    Author : Nicklas Silversved; Hampus Runesson; [2019]
    Keywords : IEEE 802.15.4; IEEE 802.15.9; ZigBee; security; key establishment; key management protocol;

    Abstract : The increasing number of IoT devices used in today’s society has led to a demand for better security in order to prevent attackers from gaining access to private information. The IoT brings a wide application scope and because of that there are a lot of ways to set up a secure network and manage keys in these kinds of networks. READ MORE

  4. 4. Ethical hacking of IoT devices: OBD-II dongles

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ludvig Christensen; Daniel Dannberg; [2019]
    Keywords : Hacking; OBD-II; Threat model; IoT security; AutoPi;

    Abstract : The subject area of this project is IT security related to cars, specifically the security of devices connected through a cars OBD-II connector. The aim of the project is to see the security level of the AutoPi OBD-II unit and to analyse where potential vulnerabilities are likely to occur when in use. READ MORE

  5. 5. Campus Network Design and Man-In-The-Middle Attack

    University essay from Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE); Högskolan i Halmstad/Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE)

    Author : Mahmood Nazari; Kun Zhou; [2014]
    Keywords : SSL; Man-In-The-Middle; MITM; ARP Poisoning;

    Abstract : Security is at the front line of most networks, and most companies apply an exclusive security policy enclosing many of the Open Systems Interconnection (OSI) layers, from application layer all the way down to Internet Protocol (IP) security. On the other hand, an area that is often not protected with high level of security is the second layer of OSI model and this can compromise the entire network to a diversity of attacks. READ MORE