International Journal of Computer Networks and Communications Security

Volume 8, Issue 7, July 2020

 

 

Man in the Middle Attacks: Analysis, Motivation and Prevention
 

Man in the Middle Attacks: Analysis, Motivation and Prevention

Pages: 52-58 (7) | [Full Text] PDF (641 KB)
D Javeed, U MohammedBadamasi, CO Ndubuisi, F Soomro, M Asif
Northeastern University, Shenyang, Liaoning province, China
Changchun University of Science and Technology, China
Central China Normal University, Wuhan China

https://doi.org/10.47277/IJCNCS/8(7)1


Abstract -
Computer systems and applications are improving day by day and with the advancement in such area it give birth to new cyber-attacks. Man in the Middle attacks (MITM) are one of those attacks. An attack where an outsider or third party enters in between two online users, where both of the users are unaware of it. The malware in such scenario mainly monitors and have the ability to change the information which is classified onsly to these two users. Mainly it is knows as a protocol to an unauthorized user within the system who can access as well as change the information of the system without leaving any trace to the existing users. This issue is critical. This paper aims to the understanding of the MITM and to understand its different categories. Finally this paper aims to present some of mechanism for the prevention of such attacks and to identify some of the future research directions in such area.
 
Index Terms - Information Security, Cyber Attacks, MITM Attacks, Network Security

Citation - D Javeed, U MohammedBadamasi, CO Ndubuisi, F Soomro, M Asif. "Man in the Middle Attacks: Analysis, Motivation and Prevention." International Journal of Computer Networks and Communications Security 8, no. 7 (2020): 52-58.