“…For example, a malicious router, also called an evil twin (Nikbakhsh, Manaf, Zamani, & Janbeglou, 2012), can be setup in a public place like a café or hotel to intercept information traveling through the router. Other ways that attackers often carry out man-in-the-middle attacks include Address Resolution Protocol (ARP) spoofing (Jinhua & Kejian, 2013), domain name system (DNS) spoofing (Yu, Chen, & Xu, 2011), Spanning Tree Protocol (STP) mangling (Lai, Pan, Liu, Chen, & Zhou, 2014), port stealing (Nath Nayak & Ghosh Samaddar, 2010), Dynamic Host Configuration Protocol (DHCP) spoofing (Duangphasuk, Kungpisdan, & Hankla, 2011), and Internet Control Message Protocol (ICMP) redirection (Arote & Arya, 2015).…”