• DocumentCode
    1936100
  • Title

    Different flavours of Man-In-The-Middle attack, consequences and feasible solutions

  • Author

    Nayak, Gopi Nath ; Samaddar, Shefalika Ghosh

  • Author_Institution
    Dept. of Comput. Sci. & Eng., Motilal Nehru Nat. Inst. of Technol., Allahabad, India
  • Volume
    5
  • fYear
    2010
  • fDate
    9-11 July 2010
  • Firstpage
    491
  • Lastpage
    495
  • Abstract
    Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users such as, stealing online account userid, password, stealing of local ftp id, ssh or telnet session etc. This paper emphasizes on different types of MITM attacks, their consequences and feasible solutions under different circumstances giving users options to choose one from various solutions. ARP spoofing and its effect in a LAN environment is studied in detail to achieve the stated objective.
  • Keywords
    Internet; computer crime; local area networks; routing protocols; ARP poisoning; ARP spoofing; DNS; LAN; MITM; address resolution protocol; computer based hacking; feasible solutions; man-in-the-middle attack; port stealing; Local area networks; Logic gates; Protocols; Rendering (computer graphics); Attacker; DNS; DoS; Feasible Solution; Gateway; MITM; Packet; Victim; Vulnerability;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
  • Conference_Location
    Chengdu
  • Print_ISBN
    978-1-4244-5537-9
  • Type

    conf

  • DOI
    10.1109/ICCSIT.2010.5563900
  • Filename
    5563900