Wi-Fi Redux: Never Trust Untrusted Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
This study analyzes the dangers posed to computer user information and their equipment as they connect to untrusted networks, such as those found in coffee shops. Included in this study is a virtualized lab consisting of the target and attacker nodes and router to facilitate communication. Also included are a binary for reverse connection and a modified binary that was created to connect back to the attacker node and bypasses most Anti-virus software.
Authors and Affiliations
Young B. Choi, Kenneth P. LaCroix
One-Year Survival Prediction of Myocardial Infarction
Myocardial infarction is still one of the leading causes of death and morbidity. The early prediction of such disease can prevent or reduce the development of it. Machine learning can be an efficient tool for predicting...
Intelligent Pedestrian Detection using Optical Flow and HOG
Pedestrian detection is an important aspect of autonomous vehicle driving as recognizing pedestrians helps in reducing accidents between the vehicles and the pedestrians. In literature, feature based approaches have been...
Polylogarithmic Gap between Meshes with Reconfigurable Row/Column Buses and Meshes with Statically Partitioned Buses
This paper studies the difference in computational power between the mesh-connected parallel computers equipped with dynamically reconfigurable bus systems and those with static ones. The mesh with separable buses (MSB)...
Envisioning Internet of Things using Fog Computing
Internet of Things is the future of the Internet. It encircles a wide scope. There are currently billions of devices connected to the Internet and this trend is expecting to grow exponentially. Cisco predicts there are a...
Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs
Malicious node invasion as black hole attack is a burning issue in MANETs. Black hole attacks with a single malicious node is easy to detect and prevent. The collaborative attacks with multiple cooperative malicious node...