Ackoski, Jugoslav (2020) Man in the middle attacks. International Journal of Science and Arts – IDEA, 4 (8). ISSN 2545-4552
Text
IJSA-IDEA-Vol-4-No-8-2-min.pdf - Published Version Download (1MB) |
Abstract
Cyber-security becomes more and more important as the technology moves forward. Having knowledge about the technologies of the modern world is crucial and helps to make a better and safer environment. This study identifies and demonstrates some of the methods which are used to exploit two or potentially more hosts in a network. Exploiting weaknesses in protocols and lack of authentication in order to place the attacker in the middle of a communication channel, such as the lack of authentication in the ARP (Address Resolution Protocol) and the lack of validation of IP addresses from the DNS (Domain Name System), which is also unencrypted. Once in the middle of the communication channel, between the hosts, explanation is given for some of the techniques that are being used, like sniffing, packet injection, session hijacking and others, that attackers use in order to either steal data, modify or in any way change how people interact with the services that they use on the internet. Suggestions are given in order to avoid and prevent these kinds of attacks, no matter if a user is just a host in a network or if they are managing a network themselves.
Item Type: | Article |
---|---|
Subjects: | Natural sciences > Computer and information sciences |
Divisions: | Military Academy |
Depositing User: | Jugoslav Ackoski |
Date Deposited: | 20 Jun 2022 08:29 |
Last Modified: | 20 Jun 2022 08:29 |
URI: | https://eprints.ugd.edu.mk/id/eprint/29859 |
Actions (login required)
View Item |