Downloads: 4 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Informative Article | Computer Science & Engineering | India | Volume 11 Issue 8, August 2022 | Popularity: 4.8 / 10
Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels
Arnab Dey
Abstract: This paper introduces an innovative approach to address the persistent challenges posed by Man-in-the-Middle (MitM) attacks in secure communication channels. The proposed solution leverages advanced encryption techniques and real-time monitoring to fortify the security of data transmission, ensuring the integrity and confidentiality of sensitive information in digital transactions.
Keywords: Man-in-the-Middle Attacks, Secure Communication Channels, Cryptographic Algorithms, Post-Quantum, Encryption, Dynamic Key Exchange, Real-time Monitoring, SSL Pinning, Multi-Factor Authentication (MFA), Intrusion Detection and Prevention System (IDPS), Endpoint Security, Security Protocols, Network Security, SSL/TLS Certificates, Anomaly Detection, Encryption Strength, Cybersecurity, Threat Mitigation, User Education, Patch Management, Regular Updates
Edition: Volume 11 Issue 8, August 2022
Pages: 1497 - 1500
DOI: https://www.doi.org/10.21275/SR24320191712
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2003 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera