A Self-Confirming Engine for Preventing Man-in-the-Middle Attack(Security)(<Special Section>Internet Technology IV)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping violation can occur because of vulnerability of address resolution protocols, Address Resolution Protocol (ARP) in IPv4 and Neighbor Discovery (ND) protocol in IPv6. Accordingly, a good method to prevent MITM attack by address mapping violation is essential for both current and future communications, i.e. wireless networks with roaming users and an interconnected world. Hence, our proposal mainly aims to have high usability in future applications such as embedded devices.
- 社団法人電子情報通信学会の論文
- 2004-03-01
著者
-
KOBAYASHI Takashi
Faculty of Science and Engineering, Doshisha University
-
Yamaguchi Suguru
Nara Inst. Of Sci. And Technol. Nara Jpn
-
KANAMORI Masataka
Nara Institute of Science and Technology
-
Kobayashi Takashi
Faculty Of Engineering Toin University Of Yokohama
-
Kobayashi Takashi
Faculty Of Informatics Kansai University
-
Kobayashi Takashi
Faculty Of Engineering Keio University
関連論文
- Reducing Processor Usage on Heavily-Loaded Network Servers with POSIX Real-Time Scheduling Control(System Programs)
- Compact Multimode Horn with Coaxial Corrugation for Circular Coverage
- Special Issue on Internet Technology III
- A benchmark tool for network I/O management architectures (特集:新しいパラダイムの中での分散システム/インターネット運用・管理)
- The Effects of Server Placement and Server Selection for Internet Services
- SB-9-8 An Analysis on Intra-Domain Routing Instability
- AI^3 Satellite Internet Infrastructure and the Deployment in Asia (Special Issue on Internet Technology)
- Measurements of the Isobaric Specific Heat Capacity of Gaseous Carbon Dioxide from 245K to 345K up to 3.7MPa
- Design and implementation of an inter-device authentication framework guaranteeing explicit ownership (特集:情報洪水時代のネットワークサービス)
- A Self-Confirming Engine for Preventing Man-in-the-Middle Attack(Security)(Internet Technology IV)
- On the Characteristics of a Bolted Joint with Tap Bolts : the case where a clamped part is a T-flange
- Considerations on the Improvement of the Stiffness of Bolted Joints in Machine Tools
- A Study on the Bending Rigidity of an Adhesive Joint Subjected to a Bending Load Tangential to Bonding Surfaces
- On the Characteristics of a Bolted Joint with Tap Bolts : the case where a clamped part is a cover of a pressure vessel
- On the Characteristics of a Bolted Joint with Tap Bolts : the case where a clamped part is a circular flange
- The Strength of Combination Joints of an Adhesive with Bolts (T-Flange Adherends Subjected to an External Bending Moment)
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- Trust-based VoIP Spam Detection based on Calling Behaviors and Human Relationships
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- A Benchmark Tool for Network I/O Management Architectures
- Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership
- A Benchmark Tool for Network I/O Management Architectures
- Measurement Results of IEEE802.11a WiFi Signal Attenuation Under Different Rain Conditions
- Effects of Magnetic Field on Metabolic Action in the Peripheral Tissue