Man in the middle attacks

Ackoski, Jugoslav (2020) Man in the middle attacks. International Journal of Science and Arts – IDEA, 4 (8). ISSN 2545-4552

[thumbnail of IJSA-IDEA-Vol-4-No-8-2-min.pdf] Text
IJSA-IDEA-Vol-4-No-8-2-min.pdf - Published Version

Download (1MB)

Abstract

Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in protocols and lack of authentication in order to place the attacker in the middle of a communication channel, such as the lack of authentication in the ARP (Address Resolution Protocol) and the lack of validation of IP addresses from the DNS (Domain Name System), which is also unencrypted. Once in the middle of the communication channel, between the hosts, explanation is given for some of the techniques that are being used, like sniffing, packet injection, session hijacking and others, that attackers use in order to either steal data, modify or in any way change how people interact with the services that they use on the internet. Suggestions are given in order to avoid and prevent these kinds of attacks, no matter if a user is just a host in a network or if they are managing a network themselves.

Item Type: Article
Subjects: Natural sciences > Computer and information sciences
Divisions: Military Academy
Depositing User: Jugoslav Ackoski
Date Deposited: 20 Jun 2022 08:29
Last Modified: 20 Jun 2022 08:29
URI: https://eprints.ugd.edu.mk/id/eprint/29859

Actions (login required)

View Item View Item