2019
DOI: 10.5267/j.ijdns.2019.1.001
|View full text |Cite
|
Sign up to set email alerts
|

Man-in-the-middle-attack: Understanding in simple words

Abstract: These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 59 publications
(35 citation statements)
references
References 37 publications
0
33
0
2
Order By: Relevance
“…The security industry offers Security Orchestration, Automation and Response (SOAR) frameworks to provide an automated and proactive security approach to this type of critical threat [33]. • Man-in-the-Middle: The MitM attack is characterised by the presence of a malicious third party interposed between two or more communicating parties, and secretly relaying or intercepting the communication between the parties [79], [101]. For the MEC scenario, a MitM attack is categorised as an infrastructure attack, where the malicious attacker tries to hijack a specific network segment and begins to launch attacks, such as eavesdropping and phishing, on connected devices [98], [100].…”
Section: Homomorphic Encryption Social Participatory Sensing Pattern Clusteringmentioning
confidence: 99%
“…The security industry offers Security Orchestration, Automation and Response (SOAR) frameworks to provide an automated and proactive security approach to this type of critical threat [33]. • Man-in-the-Middle: The MitM attack is characterised by the presence of a malicious third party interposed between two or more communicating parties, and secretly relaying or intercepting the communication between the parties [79], [101]. For the MEC scenario, a MitM attack is categorised as an infrastructure attack, where the malicious attacker tries to hijack a specific network segment and begins to launch attacks, such as eavesdropping and phishing, on connected devices [98], [100].…”
Section: Homomorphic Encryption Social Participatory Sensing Pattern Clusteringmentioning
confidence: 99%
“…This can include credit card information or any other sensitive data. Additionally, the attacker continues to pass the submitted information to the legitimate website so that original transaction is not affected [45].…”
Section: 54) Man-in-the-middle Attackmentioning
confidence: 99%
“…They lack of using safe standards. In most cases, after getting all the required authentications, fake websites may redirect users to their original website having SSL certificates to fool users [45,46].…”
Section: 55) Secure Socket Layer (Ssl) Attackmentioning
confidence: 99%
“…However, this way of building the table is not effective in mitigating the ARP Cache Poisoning Attack. This is because of the fact that the attacker can carry out a DHCP spoofing attack [37] which can corrupt or poison the IP-MAC bindings maintained by the Controller. Hence, creation of trusted IP-MAC bindings table in all these solutions is a major issue.…”
Section: Issues With Ip-mac Address Bindings On the Controller Based mentioning
confidence: 99%