2017
DOI: 10.24128/ijraer.2017.bc45wx
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-Middle Attack

Abstract: Abstract:Now a days MITMA is very harmful for the user of internet. This paper is describe the different effect of MITMA. We also discuss about various method from prevention of MITMA. Abbreviated as MITMA, a man-in-the-middle attack is an attack where a user gets between the sender and receiver of information and sniffs any information being sent. In some cases, users may be sending unencrypted data, which means the man-in-the-middle (MITM) can obtain any unencrypted information. In other cases, a user may be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Despite their high cost, self-healing concretes Developments in Clay Science and Construction Techniques based on nanomaterials should be evaluated for adoption due to their long-term benefits. Nanomaterials are anticipated to provide remarkable solutions for resolving any complex problems, leading to their use on a commercial scale and making them affordable [242]. Despite all of this, environmental issues and health risks are two main drawbacks of using nanoparticles in the building industry [243,244].…”
Section: Challenges and Future Perspectives 61 Challengesmentioning
confidence: 99%
“…Despite their high cost, self-healing concretes Developments in Clay Science and Construction Techniques based on nanomaterials should be evaluated for adoption due to their long-term benefits. Nanomaterials are anticipated to provide remarkable solutions for resolving any complex problems, leading to their use on a commercial scale and making them affordable [242]. Despite all of this, environmental issues and health risks are two main drawbacks of using nanoparticles in the building industry [243,244].…”
Section: Challenges and Future Perspectives 61 Challengesmentioning
confidence: 99%
“…At the nanometer scale, many macroscopic properties of a material change, allowing the material to perform differently in various applications [7 -10]. Nanotechnology involves the 'bottom-up' approach to create nano-composites by modifying organic and inorganic structures with molecular assemblages, aggregates and fibers, chemical bonds, intermolecular forces and intraphase diffusion [7,9,11].…”
Section: Nanotechnologymentioning
confidence: 99%
“…Furthermore, cross-site scripting (XSS) changes susceptible websites and compromises the data interaction on that web page [7]. Another attack, named path traversal, allows access to the web servers by navigating the trails of a user to gain access to the data [8]. Spooling is another method to gain access to the data by malicious users at input and output devices, from where data is originated and delivered [9].…”
Section: Introductionmentioning
confidence: 99%
“…The MITM is a type of security invasion in which the attacker even drops the communication among users or users with a Web page. This attack occurs between two legally interconnecting hosts that allow the invader to snoop on communication that is not legal to listen [8]. In this attack, the attacker sits between the sender and receiver, thus known as a Man-In-The-Middle attack.…”
Section: Introductionmentioning
confidence: 99%