International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 4 | Views: 281 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Informative Article | Computer Science & Engineering | India | Volume 11 Issue 8, August 2022 | Popularity: 4.8 / 10


     

Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels

Arnab Dey


Abstract: This paper introduces an innovative approach to address the persistent challenges posed by Man-in-the-Middle (MitM) attacks in secure communication channels. The proposed solution leverages advanced encryption techniques and real-time monitoring to fortify the security of data transmission, ensuring the integrity and confidentiality of sensitive information in digital transactions.


Keywords: Man-in-the-Middle Attacks, Secure Communication Channels, Cryptographic Algorithms, Post-Quantum, Encryption, Dynamic Key Exchange, Real-time Monitoring, SSL Pinning, Multi-Factor Authentication (MFA), Intrusion Detection and Prevention System (IDPS), Endpoint Security, Security Protocols, Network Security, SSL/TLS Certificates, Anomaly Detection, Encryption Strength, Cybersecurity, Threat Mitigation, User Education, Patch Management, Regular Updates


Edition: Volume 11 Issue 8, August 2022


Pages: 1497 - 1500


DOI: https://www.doi.org/10.21275/SR24320191712



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Arnab Dey, "Innovative Approach to Mitigate Man-in-the-Middle Attacks in Secure Communication Channels", International Journal of Science and Research (IJSR), Volume 11 Issue 8, August 2022, pp. 1497-1500, URL: https://www.ijsr.net/getabstract.php?paperid=SR24320191712, DOI: https://www.doi.org/10.21275/SR24320191712



Downloads: 656 | Views: 2003 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 1454 - 1458

Heart Disease Prediction with Machine Learning Approaches

Megha Kamboj


Downloads: 401 | Views: 719 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 7 Issue 11, November 2018

Pages: 1951 - 1955

Hadoop Performance Improvement using Metadata and Securing with Oauth Token

Swapnali A. Salunkhe, Amol B. Rajmane


Downloads: 386 | Views: 700 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1 - 3

Comparative Study of Conventional Desktop Computer and Compute Stick

Aadarsh Sooraj, Sooraj G.


Downloads: 354 | Views: 698 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 629 - 632

Review Paper on Secure Hashing Algorithm and Its Variants

Priyanka Vadhera, Bhumika Lall


Downloads: 336 | Views: 688 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2

Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2148 - 2152

The Impact and Application of 3D Printing Technology

Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera


Top