会议专题

Different Flavours of Man-In-The-Middle Attack, Consequences and Feasible Solutions

Man-In-The-Middle (MITM) attack is one of the primary techniques employed in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service (DoS), DNS spoofing and Port stealing. MITM attack is particularly suitable in a LAN environment, Where it is typically performed through ARP poisoning. MITM attack of every kind has lot of surprising consequences in store for users such as, stealing online account userid, password, stealing of local ftp id, ssh or telnet session etc. This paper emphasizes on different types of MITM attacks, their consequences and feasible solutions under different circumstances giving users options to choose one from various solutions. ARP spoofing and its effect in a LAN environment is studied in detail to achieve the stated objective.

MITM DoS DNS Vulnerability Feasible Solution Attacker Victim Gateway Packet

Gopi Nath Nayak Shefalika Ghosh Samaddar

Corresponding Author & M.Tech IV Semester Student Faculty Mernber Department of Computer Science and Engineering Motial Nehru National Institute of Te

国际会议

2010 3rd IEEE International Conference on Computer Science and Information Technology(第三届IEEE计算机科学与信息技术国际会议 ICCSIT 2010)

成都

英文

491-495

2010-07-07(万方平台首次上网日期,不代表论文的发表时间)