A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges
Keywords:
Man-in-the-middle attack, attacker, victim, ARP Cache Poisoning, DNS spoofing, Session HijackingAbstract
This paper presents a survey of man-in-the-middle attacks in communication networks and methods of protection against them. Man in the middle attack allows the attacker to gain unauthorized entry into the connection between two devices and listen to the network traffic. This paper focuses on the areas where man-in-the-middle attack can occur and the different methods with which we can defense against the attack.
References
Kapil M Jain & Manoj V Jain, International Journal of Science Technology and Engineering, Man in the Middle Attack survey, March 2016.
Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security, Vol-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500,
Pushpendra Kumar Pateriya, Analysis on Man in the Middle attack on SSL, International Journal Of Computer Application, 23 May 2012.
Animesh Dubey, Ravindra Gupta, Gajendra Singh, Survey and Analysis of Client Side Detection of Content Sniffing Attack, March,2013
Margaret Rouse, Hijacking, 2012.
Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp(1-5), Mar, 2016. Doi: 10.1109/CDAN.2016.7570921,
S. Kak, Quantum information and entropy, 2007.
G. N. Nayak and S. G. Samaddar, different flavours of man-in-the-middle-attack, consequences and feasible solutions, 2010.
B. Issac, Secure ARP and secure DHCP protocols to Mitigate Security Attacks. International Journal of network security 8, 2009.
Tanmay Patange, How to defend yourself against MITM or Man-in-the-Middle attack, October 2013.
http://destroyadware.com/articles/security/3-effective-ways-defend-man-middle-attack-mitm/, 3 effective ways to defend against a Man-in-the-Middle Attack (MITM)
Rachna Jain, Sushila Madan and Bindu Garg, "Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment", International Journal of Computer Sciences and Engineering, Volume-03, Issue-01, Page No (130-135), Jan -2015,
Trend Micro, What is the Man-In-The-Middle attack and how can I protect myself from them? , 28 November 2012.
Michael Gregg, How new technologies are reshaping MITM attacks, 23 July 2013.
Dinu P S, Deepa S Kumar, Dr. M Abdul Rehman, Preventing SQL injection Attacks Using Cryptography Methods, 5 May 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
