2019
DOI: 10.35806/ijoced.v1i1.36
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Man-in-the-middle-attack through Survey of Literature

Abstract: These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…There may be many objectives for an attack either using the data overheard for a subsequent action or changing the data before it reaches the other party. The attacker extracts information to be used in many ways: fraud, unapproved support exchanges, blackmail, credential theft, and spying [37].…”
Section: Man-in-the-middlementioning
confidence: 99%
See 2 more Smart Citations
“…There may be many objectives for an attack either using the data overheard for a subsequent action or changing the data before it reaches the other party. The attacker extracts information to be used in many ways: fraud, unapproved support exchanges, blackmail, credential theft, and spying [37].…”
Section: Man-in-the-middlementioning
confidence: 99%
“…A MITM attack intercepts the victim's activity through the attacker's system before it is routed to its intended destination. The attacker gains access to an unsecured network, often targeting networks in public areas such as Wi-Fi access points [37]. This provides the attacker with an avenue to deploy tools that intercept information between the victims, often targeting personal computers where their connection to websites is monitored.…”
Section: Man-in-the-middlementioning
confidence: 99%
See 1 more Smart Citation
“…In this situation, the attacker discovers that the existing security controls provided by the CSP of Prime MotorX have not been correctly implemented, leading to vulnerabilities that grant unauthorized access to the processing layer's resources. One example is the attacker's use of a MITM attack [104] to intercept web traffic and access sensitive information within Prime MotorX's processing layer due to the lack of web traffic encryption. This attack can have severe consequences, enabling the attacker to obtain user credentials and sensitive corporate and customer data, potentially disrupting production or gaining control over Prime MotorX's entire IT environment.…”
Section: Scenario−7mentioning
confidence: 99%
“…This attack is quite dangerous because the attacker can sniff the sent packet's information, potentially data hijacking [15]. MITM attacks are likely ball situations where two players intend to pass the ball to each other while one player between them tries to grab it [16]. MITM attacks focus on the information flowing between the endpoints, confidentiality, and the information's accuracy.…”
Section: Introductionmentioning
confidence: 99%