2022
DOI: 10.29207/resti.v6i3.4035
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of CNN-MLP and CNN-LSTM for MitM Attack Detection System

Abstract: Man in the Middle (MitM) is one of the attack techniques conducted for eavesdropping on data transitions or conversations between users in some systems secretly. It has a sizeable impact because it could make the attackers will do another attack, such as website or system deface or phishing. Deep Learning could be able to predict various data well. Hence, in this study, we would like to present the approach to detect MitM attacks and process its data, by implementing hybrid deep learning methods. We used 2 (tw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Other studies use the forensic process model when performing network forensics on MITM attacks, which are part of advanced network attacks [14]. MITM attacks are frequently linked to credential theft, which is considered a cybercrime, and a method for sniffing the victim's network traffic communications against the gateway that are exchanged between users in some systems covertly [15], [16] . Among the cybercrime attacks mentioned, the effect of the ARP spoofing attack initiator is one example [17][18][19].…”
Section: Introductionmentioning
confidence: 99%
“…Other studies use the forensic process model when performing network forensics on MITM attacks, which are part of advanced network attacks [14]. MITM attacks are frequently linked to credential theft, which is considered a cybercrime, and a method for sniffing the victim's network traffic communications against the gateway that are exchanged between users in some systems covertly [15], [16] . Among the cybercrime attacks mentioned, the effect of the ARP spoofing attack initiator is one example [17][18][19].…”
Section: Introductionmentioning
confidence: 99%