Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a critical cybersecurity vulnerability in this 20-minute IEEE conference talk on MitM attacks through name collisions in the new gTLD era. Delve into the causes, vulnerability assessment, and potential remediation strategies for this emerging threat that exploits the Web Proxy Auto-Discovery (WPAD) protocol. Gain insights into how internal namespace query leakage can lead to automatic traffic redirection to malicious proxies. Examine the role of end-user device settings in exacerbating the problem and learn about the concept of "highly-vulnerable domains." Understand the urgent need for proactive protection measures and evaluate potential solutions at the registry, Autonomous System, and end-user levels.

Syllabus

Introduction
High Level Picture
Background
Fundamental Problem
Source of Leakage
Domain Suffix
Cause Analysis
Attack Surface Characterization
Current Registration Status
Remediation Strategies
Summary

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of MitM Attack by Name Collision - Cause Analysis and Vulnerability Assessment in the New gTLD Era

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.