Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions.
Laiali AlmazaydehJun ZhangPeiqiao WuRuoqi WeiYisheng ChengKhaled M. ElleithyPublished in: Comput. Inf. Sci. (2018)
Keyphrases
- buffer overflow
- security measures
- cyber attacks
- access control
- fault injection
- denial of service attacks
- security threats
- network access
- security risks
- real world
- practical solutions
- enterprise network
- security mechanisms
- forensic analysis
- information security
- security policies
- countermeasures
- security vulnerabilities
- security issues
- trust relationships
- dos attacks
- malicious users
- data transmission
- intrusion detection
- network structure
- security management
- attack scenarios
- smart card
- ddos attacks
- computer networks
- storage devices
- network management
- data corruption
- malicious traffic
- virtual private network
- directory service
- critical infrastructure
- security requirements
- network security
- network traffic
- intrusion detection system
- anomaly detection
- peer to peer