2022
DOI: 10.12968/s1353-4858(22)70028-1
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting man-in-the-middle attacks against HTTPS

Abstract: A man-in-the-middle (MitM) attack enables threat actors to position themselves in a conversation between two parties. It can be used to eavesdrop on, or impersonate, either of the parties and may enable the perpetrator to steal personal information, including login credentials, payment card data and account details. By leveraging the hijacked information, the attacker can perform an unsanctioned password change, commit identity theft, authorise money transfers, and so on. This article re-examines MitM against … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…Security Assertion Markup Language (SAML) [17] is a protocol that can be used to build a federated IDM (FIDM) system. SAML protocol allows identity authentication between organizations where users are members of the IDP.…”
Section: A Traditional Identity Management In Social Networkmentioning
confidence: 99%
“…Security Assertion Markup Language (SAML) [17] is a protocol that can be used to build a federated IDM (FIDM) system. SAML protocol allows identity authentication between organizations where users are members of the IDP.…”
Section: A Traditional Identity Management In Social Networkmentioning
confidence: 99%
“…This may seem unusual, given that this work does concentrate on the detection of application layer attacks. The basic reason behind this choice is that, typically, the application features are encrypted (and thus not available) due to, say, a TLS tunnel [ 30 ] or other mechanisms [ 31 ], including encrypted DNS [ 32 ]. Additionally, in certain cases, e.g., SSH, the traffic cannot be decrypted.…”
Section: Feature Selection and Data Preprocessingmentioning
confidence: 99%
“…In order to obtain a user's password in plain text, an attacker may act as a "man in the middle" by intercepting the connection between the user's browser and the end server. While best safety practices indicate that all traffic between clients and servers should be secured by encryption such as HTTPS, a large number of online sites still use unencrypted traffic over HTTP [25,26]. If an attacker is able to intercept requests by the user in plain text, there is no need to brute force the password.…”
Section: Man In the Middlementioning
confidence: 99%