Title :
Different flavours of Man-In-The-Middle attack, consequences and feasible solutions
Author :
Nayak, Gopi Nath ; Samaddar, Shefalika Ghosh
Author_Institution :
Dept. of Comput. Sci. & Eng., Motilal Nehru Nat. Inst. of Technol., Allahabad, India
Abstract :
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users such as, stealing online account userid, password, stealing of local ftp id, ssh or telnet session etc. This paper emphasizes on different types of MITM attacks, their consequences and feasible solutions under different circumstances giving users options to choose one from various solutions. ARP spoofing and its effect in a LAN environment is studied in detail to achieve the stated objective.
Keywords :
Internet; computer crime; local area networks; routing protocols; ARP poisoning; ARP spoofing; DNS; LAN; MITM; address resolution protocol; computer based hacking; feasible solutions; man-in-the-middle attack; port stealing; Local area networks; Logic gates; Protocols; Rendering (computer graphics); Attacker; DNS; DoS; Feasible Solution; Gateway; MITM; Packet; Victim; Vulnerability;
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
DOI :
10.1109/ICCSIT.2010.5563900