Open Access   Article Go Back

A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges

Manjula Kalita1 , Sukanya Dutta2 , Ayesha Yesmin3

Section:Survey Paper, Product Type: Journal Paper
Volume-04 , Issue-07 , Page no. 62-66, Dec-2016

Online published on Dec 09, 2016

Copyright © Manjula Kalita, Sukanya Dutta , Ayesha Yesmin . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Manjula Kalita, Sukanya Dutta , Ayesha Yesmin, “A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges,” International Journal of Computer Sciences and Engineering, Vol.04, Issue.07, pp.62-66, 2016.

MLA Style Citation: Manjula Kalita, Sukanya Dutta , Ayesha Yesmin "A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges." International Journal of Computer Sciences and Engineering 04.07 (2016): 62-66.

APA Style Citation: Manjula Kalita, Sukanya Dutta , Ayesha Yesmin, (2016). A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges. International Journal of Computer Sciences and Engineering, 04(07), 62-66.

BibTex Style Citation:
@article{Kalita_2016,
author = {Manjula Kalita, Sukanya Dutta , Ayesha Yesmin},
title = {A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2016},
volume = {04},
Issue = {07},
month = {12},
year = {2016},
issn = {2347-2693},
pages = {62-66},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=155},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=155
TI - A Survey on Man in the Middle Attack: Classification, Defense Mechanisms and Challenges
T2 - International Journal of Computer Sciences and Engineering
AU - Manjula Kalita, Sukanya Dutta , Ayesha Yesmin
PY - 2016
DA - 2016/12/09
PB - IJCSE, Indore, INDIA
SP - 62-66
IS - 07
VL - 04
SN - 2347-2693
ER -

           

Abstract

This paper presents a survey of man-in-the-middle attacks in communication networks and methods of protection against them. Man in the middle attack allows the attacker to gain unauthorized entry into the connection between two devices and listen to the network traffic. This paper focuses on the areas where man-in-the-middle attack can occur and the different methods with which we can defense against the attack.

Key-Words / Index Term

Man-in-the-middle attack, attacker, victim, ARP Cache Poisoning, DNS spoofing, Session Hijacking

References

[1] Kapil M Jain & Manoj V Jain, International Journal of Science Technology and Engineering, Man in the Middle Attack survey, March 2016.
[2] Umesh Kumar Singh, Shivlal Mewada, Lokesh Laddhani and Kamal Bunkar, “An Overview & Study of Security Issues in Mobile Ado Networks”, International Journal of Computer Science and Information Security, Vol-9, No.4, pp (106-111), April 2011.ISSN: 1947-5500,
[3] Pushpendra Kumar Pateriya, Analysis on Man in the Middle attack on SSL, International Journal Of Computer Application, 23 May 2012.
[4] Animesh Dubey, Ravindra Gupta, Gajendra Singh, Survey and Analysis of Client Side Detection of Content Sniffing Attack, March,2013
[5] Margaret Rouse, Hijacking, 2012.
[6] Shivlal Mewada, Pradeep Sharma, S.S Gautam, “Exploration of Efficient Symmetric AES Algorithm”, 2016 Symposium on Colossal Data Analysis and Networking (CDAN), pp(1-5), Mar, 2016. Doi: 10.1109/CDAN.2016.7570921,
[7] S. Kak, Quantum information and entropy, 2007.
[8] G. N. Nayak and S. G. Samaddar, different flavours of man-in-the-middle-attack, consequences and feasible solutions, 2010.
[9] B. Issac, Secure ARP and secure DHCP protocols to Mitigate Security Attacks. International Journal of network security 8, 2009.
[10] Tanmay Patange, How to defend yourself against MITM or Man-in-the-Middle attack, October 2013.
[11] http://destroyadware.com/articles/security/3-effective-ways-defend-man-middle-attack-mitm/, 3 effective ways to defend against a Man-in-the-Middle Attack (MITM)
[12] Rachna Jain, Sushila Madan and Bindu Garg, "Analyzing Various Existing Security Techniques to Secure Data Access in Cloud Environment", International Journal of Computer Sciences and Engineering, Volume-03, Issue-01, Page No (130-135), Jan -2015,
[13] Trend Micro, What is the Man-In-The-Middle attack and how can I protect myself from them? , 28 November 2012.
[14] Michael Gregg, How new technologies are reshaping MITM attacks, 23 July 2013.
[15] Dinu P S, Deepa S Kumar, Dr. M Abdul Rehman, Preventing SQL injection Attacks Using Cryptography Methods, 5 May 2015.