DocumentCode :
1936100
Title :
Different flavours of Man-In-The-Middle attack, consequences and feasible solutions
Author :
Nayak, Gopi Nath ; Samaddar, Shefalika Ghosh
Author_Institution :
Dept. of Comput. Sci. & Eng., Motilal Nehru Nat. Inst. of Technol., Allahabad, India
Volume :
5
fYear :
2010
fDate :
9-11 July 2010
Firstpage :
491
Lastpage :
495
Abstract :
Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users such as, stealing online account userid, password, stealing of local ftp id, ssh or telnet session etc. This paper emphasizes on different types of MITM attacks, their consequences and feasible solutions under different circumstances giving users options to choose one from various solutions. ARP spoofing and its effect in a LAN environment is studied in detail to achieve the stated objective.
Keywords :
Internet; computer crime; local area networks; routing protocols; ARP poisoning; ARP spoofing; DNS; LAN; MITM; address resolution protocol; computer based hacking; feasible solutions; man-in-the-middle attack; port stealing; Local area networks; Logic gates; Protocols; Rendering (computer graphics); Attacker; DNS; DoS; Feasible Solution; Gateway; MITM; Packet; Victim; Vulnerability;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
Conference_Location :
Chengdu
Print_ISBN :
978-1-4244-5537-9
Type :
conf
DOI :
10.1109/ICCSIT.2010.5563900
Filename :
5563900
Link To Document :
بازگشت