Now 40 visitors
Today:235 Yesterday:622
Total: 43272 19S 5P 0R
2025-07-12, Week 28
TACT Journal Page
Call for Paper
Author Page
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20210126 Question.2
Questioner: shahram@ieee.org    2021-02-09 ¿ÀÈÄ 2:08:28
IEEE/ICACT20210126 Answer.2
Answer by Auhor k.agordzo@gmail.com   2021-02-09 ¿ÀÈÄ 2:08:28
How does your approach prevent SSL-stripping if the MITM attack is conducted based on methods other than ARP-spoofing e.g. fake certifications or DNS manipulation? In The approach proposed here, the prevention is done on the switch which is the lower layer of the OSI model. So this approach is not limited to just ARP spoofing but other attacks. In step 6 of the algorithm, there are three conditions, once any of this is met, the interface on which the attack is will be shut. So even if the attack is in the upper layer of the OSI model, in the process of the attack as long as the packets generated in a second, exceeds the number of packets which is considered normal, the interface will be shut.

Select Voice