2021
DOI: 10.26594/register.v8i1.2190
|View full text |Cite
|
Sign up to set email alerts
|

Block-hash of blockchain framework against man-in-the-middle attacks

Abstract: Payload authentication is vulnerable to Man-in-the-middle (MITM) attack. Blockchain technology offers methods such as peer to peer, block hash, and proof-of-work to secure the payload of authentication process. The implementation uses block hash and proof-of-work methods on blockchain technology and testing is using White-box-testing and security tests distributed to system security practitioners who are competent in MITM attacks. The analyisis results before implementing Blockchain technology show that the au… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Other studies use the forensic process model when performing network forensics on MITM attacks, which are part of advanced network attacks [14]. MITM attacks are frequently linked to credential theft, which is considered a cybercrime, and a method for sniffing the victim's network traffic communications against the gateway that are exchanged between users in some systems covertly [15], [16] . Among the cybercrime attacks mentioned, the effect of the ARP spoofing attack initiator is one example [17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Other studies use the forensic process model when performing network forensics on MITM attacks, which are part of advanced network attacks [14]. MITM attacks are frequently linked to credential theft, which is considered a cybercrime, and a method for sniffing the victim's network traffic communications against the gateway that are exchanged between users in some systems covertly [15], [16] . Among the cybercrime attacks mentioned, the effect of the ARP spoofing attack initiator is one example [17][18][19].…”
Section: Introductionmentioning
confidence: 99%