Inicio > > Ciencias de la computación > Inteligencia artificial > Effective Attack Handling Methods for Layer Wise Spoofing Based Man in the Middle Attacks in Machine to Machine Networks
Effective Attack Handling Methods for Layer Wise Spoofing Based Man in the Middle Attacks in  Machine to Machine Networks

Effective Attack Handling Methods for Layer Wise Spoofing Based Man in the Middle Attacks in Machine to Machine Networks

Sabitha Banu A

39,25 €
IVA incluido
Consulta disponibilidad
Editorial:
Draft2Digital
Año de edición:
2024
Materia
Inteligencia artificial
ISBN:
9798224361977

Selecciona una librería:

  • Librería Desdémona
  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Machine to Machine networks (M2M) is a technology where all the devices worldwide are interconnected through the Internet to exchange information between the devices without human interventions. M2M networks is considered to be the intelligent connection and communication between machines. Machine to Machine networks is used for remote monitoring of the machines, and it has laid the foundation for IoT technology. In M2M networks architecture, all the devices are connected through a powerful device called gateway to transmit information. Every node in the Machine-to- Machine networks collects a data through sensors, and the collected data is transmitted to other networks through M2M gateways. M2M networks encounters several attacks. Man in The Middle attack (MTTM) is one of the oldest and classic cyber-attacks that compromises all the CTA rules, and it belongs to both Active and Passive attack types. The attackers intend to steal sensitive information or credentials and eavesdrop the data to intercept or modify or delete the data. There are many different forms of threats, attacks, and vulnerabilities that may corrupt and compromise the system’s security, which affects Confidentiality, Integrity, and Availability. Conceptually, Network attacks classified into active attacks that get access to system resources and passive attacks that do not. Active attacks are those in which the attacker acquires unlawful access to the system’s resources. However, MITM attack’s belong to both active and passive attacks.

Artículos relacionados

  • Artificial Cognition Systems
    ...
    Disponible

    125,44 €

  • Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition
    Vijay Kumar Mago
    The need for intelligent machines in areas such as medical diagnostics, biometric security systems, and image processing motivates researchers to develop and explore new techniques, algorithms, and applications in this evolving field. Cross-Disciplinary Applications of Artificial Intelligence and Pattern Recognition: Advancing Technologies provides a common platform for researc...
    Disponible

    257,39 €

  • Emerging Applications of Natural Language Processing
    Over the last few years, the area of Natural Language Processing has drastically grown in recognition, not only within the research and development community, but also with industry professionals. As NLP continues to be discussed and researched, certain areas continue to grow and mature. As a result, the need for advanced research and information is in high demand. Emerging App...
    Disponible

    256,06 €

  • Androids, Cyborgs, and Robots in Contemporary Culture and Society
    Steven John Thompson
    Mankind’s dependence on artificial intelligence and robotics is increasing rapidly as technology becomes more advanced. Finding a way to seamlessly intertwine these two worlds will help boost productivity in society and aid in a variety of ways in modern civilization. Androids, Cyborgs, and Robots in Contemporary Culture and Society is an essential scholarly resource that delve...
    Disponible

    268,90 €

  • Deep Learning Innovations and Their Convergence With Big Data
    The expansion of digital data has transformed various sectors of business such as healthcare, industrial manufacturing, and transportation. A new way of solving business problems has emerged through the use of machine learning techniques in conjunction with big data analytics. Deep Learning Innovations and Their Convergence With Big Data is a pivotal reference for the latest sc...
    Disponible

    268,78 €

  • Computational Psychoanalysis and Formal Bi-Logic Frameworks
    Giuseppe Iurato
    Computational psychoanalysis is a new field stemming from Freudian psychoanalysis. The new area aims to understand the primary formal structures and running mechanisms of the unconscious while implementing them into computer sciences. Computational Psychoanalysis and Formal Bi-Logic Frameworks provides emerging information on this new field which uses psychoanalysis and the unc...
    Disponible

    282,18 €