2018
DOI: 10.11591/ijeecs.v12.i3.pp1117-1125
|View full text |Cite
|
Sign up to set email alerts
|

A Review on Various Sniffing Attacks and its Mitigation Techniques

Abstract: <p>Security in the era of digital computing plays a vital role. Of various attacks in the field of computing, Distributed Denial of service (DDoS) attacks, Man-in-the-Middle Attack (MITM) and data theft have their major impact on the emerging applications. The sniffing attacks, one of the most prominent reasons for DDoS attacks, are the major security threats in the client-server computing. The content or packet sniffer snorts the most sensitive information from the network and alters or disturbs the leg… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
11
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 19 publications
0
11
0
1
Order By: Relevance
“…This makes access control attack one of the major concerns at the application layer [36]. Sniffing attack takes place with the help of sniffing tools where attacker sniffs network traffic data, and confidential data is compromised in this attack [37].…”
Section: Security Issues In Iot Domainmentioning
confidence: 99%
“…This makes access control attack one of the major concerns at the application layer [36]. Sniffing attack takes place with the help of sniffing tools where attacker sniffs network traffic data, and confidential data is compromised in this attack [37].…”
Section: Security Issues In Iot Domainmentioning
confidence: 99%
“…In [8], the vulnerabilities and the threats in critical infrastructures are presented, and possible solutions are recommended. In [9], the authors present a review of the existing sniffing attacks, variations of these attacks, and prevention and detection techniques. Moreover, in [10], the authors presented a review of SQL injection attacks.…”
Section: Related Workmentioning
confidence: 99%
“…In the past, the electronic devices that facilitated various needs were independent, and other isolated systems functioned to meet the required objectives. Since systems such as smart homes [ 1 ] are now required to provide the user’s needs remotely, they are prone to cyber attacks, namely, phishing attacks [ 2 ], man-in-the-middle attacks, and DDoS attacks [ 3 ]. Such IoT devices have scales for generating data, from small-scale applications with a few bytes every second to those with several kilobytes every second, depending upon the addressed application.…”
Section: Introductionmentioning
confidence: 99%