2010 3rd International Conference on Computer Science and Information Technology 2010
DOI: 10.1109/iccsit.2010.5563900
|View full text |Cite
|
Sign up to set email alerts
|

Different flavours of Man-In-The-Middle attack, consequences and feasible solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(15 citation statements)
references
References 1 publication
0
9
0
Order By: Relevance
“…List of references Standardized DNS encryption methodologies [3,32,36,44,47,50,54,61,63,66,71,117] Adoption and performance [11, 12, 23, 30, 31, 38, 42, 46, 48, 53, 55-57, 81, 91, 92, 101, 111, 116, 117, 119] Benefits of DNS encryption [20,33,69,89,101,119,123] Practical issues and security vulnerability [9, 18, 19, 29, 34, 39, 49, 58, 59, 62, 64, 65, 67, 70, 72, 76-78, 80, 87, 88, 95, 96, 98, 100, 104, 119] Malware misuse: command and control (C&C) communications [28,33,45,51,75,90,93,94,106,108,118,121] Malware misuse: data exfiltration (or tunneling) [2,5,18,37,52,60,86,97,109] Detecting and classifying encrypted DNS traffic [26,27,35,41,…”
Section: Category Of Topics Covered By This Surveymentioning
confidence: 99%
See 1 more Smart Citation
“…List of references Standardized DNS encryption methodologies [3,32,36,44,47,50,54,61,63,66,71,117] Adoption and performance [11, 12, 23, 30, 31, 38, 42, 46, 48, 53, 55-57, 81, 91, 92, 101, 111, 116, 117, 119] Benefits of DNS encryption [20,33,69,89,101,119,123] Practical issues and security vulnerability [9, 18, 19, 29, 34, 39, 49, 58, 59, 62, 64, 65, 67, 70, 72, 76-78, 80, 87, 88, 95, 96, 98, 100, 104, 119] Malware misuse: command and control (C&C) communications [28,33,45,51,75,90,93,94,106,108,118,121] Malware misuse: data exfiltration (or tunneling) [2,5,18,37,52,60,86,97,109] Detecting and classifying encrypted DNS traffic [26,27,35,41,…”
Section: Category Of Topics Covered By This Surveymentioning
confidence: 99%
“…This is because attackers need to establish TCP and TLS connections for each attempt of attack (i.e., malicious DNS lookup), leading to higher computing resources required to overwhelm a DNS server. Lastly, encrypting DNS communications between clients and resolvers also reduces the chance of man-in-the-middle (MITM) DNS spoofing attacks [89] that aim to mislead (i.e., redirect) clients towards malicious destination IP addresses by hijacking and manipulating DNS responses. As a use-case, authors of [69] developed a secured addressing mechanism using DoH for network time protocol (NTP) systems to prevent the off-path attacks [68] which redirect clients to malicious timing servers via manipulated DNS responses.…”
Section: Protecting User Privacymentioning
confidence: 99%
“…Man in the Middle (MitM) attack is a hacking methodology whereby an attacker poisoned the ARP caches of two communicating hosts to intercept their communication with the aim of causing host exploitation such as session hijacking, theft of sensitive data, port stealing and impersonation of login credential [8]. To launch the attack, the attacker first collect the MAC addresses of its victims by broadcasting an ARP request to the victims' entire network.…”
Section: A Man In the Middle Attackmentioning
confidence: 99%
“…Gopi Nath Nayak and Shefalika Ghosh Samaddar [11] proposed two solutions in order to prevent ARP poisoning. The first one sends arping request messages to the default gateway at fixed time intervals.…”
Section: Related Workmentioning
confidence: 99%