1) man-in-middle-attack
匿名中间人攻击
2) anonymous attack
匿名攻击
3) Anonymous DDoS attack
匿名DDoS攻击
4) man-in-the-middle attack
中间人攻击
1.
The Implementation of SSL Man-in-the-middle Attack Using OpenSSL
应用OpenSSL对SSL协议中间人攻击的实现
2.
First,by analyzing the two email protocols,the corresponding man-in-the-middle attacks are proposed,where the adversary forges the messages in the receiving phase to cheat the two communication participants and makes them share the wrong session keys with him.
首先,通过对2个电子邮件协议的分析,提出了相应的中间人攻击方法,其中攻击者在协议的接收阶段通过伪造信息来欺骗通信双方,并使通信双方与其共享错误的会话密钥。
3.
This article presents and implements an effective and efficient method based on Man-in-the-Middle attack,using the method, we can obtain the initial transferred files.
SMB协议是一个用于在局域网共享文件的网络协议,本文提出并实现了一种SMB协议信息获取的有效方法,通过中间人攻击的方式对局域网内共享文件传输和网络打印的信息进行了获取,得到最初的传输文件。
5) Man in middle attack
中间人攻击
1.
A study on fundamental principles of the IKE is conducted , and its security problems such as Denial of service attack ,Man in middle attack etc, are discussed.
在分析IKE协议工作原理的基础上,对可能遭受的拒绝服务攻击和中间人攻击做了进一步的探讨。
2.
First,analyzes the mechanism of IKE and introduces three kinds of attacks:man in middle attack,denial of service by flooding attack and resending attack.
介绍了密钥交换协议IKE的相关知识及其工作原理,在此基础上分析了中间人攻击、重放攻击及拒绝服务攻击的基理,结合IKE的工作过程,分析IKE遭受三种攻击的方式和可能性,提出用"联锁协议"在IKE中防"中间人攻击",通过消息ID防"重放攻击"并研究了用来防止"拒绝服务攻击"的Cookie的生成问题。
6) man-in-middle attack
中间人攻击
1.
After the mechanism of IKE with signature was introduced,the two kinds of man-in-middle attack were analyzed.
简要介绍基于数字签名认证方式的IKE协议工作机制之后,分析了IKE协议容易遭受的两种中间人攻击,针对中间人攻击导致用户身份泄漏的安全缺陷,提出两种改进方案并给出改进前后定量的性能分析。
2.
In addition, an improved scheme without additional computational complication which can resist the man-in-middle attack, conspiracy attack and Denial-of-Service(DoS) attack is proposed.
提出一种抗中间人攻击、抗基于重放消息的合谋攻击以及抗DOS攻击的认证方案,有效地避免原方案的不足,具有更高安全性。
补充资料:匿名
不写姓名或隐瞒真实的姓名:匿名信|匿名帖。
说明:补充资料仅用于学习参考,请勿用于其它任何用途。
参考词条