JCS_V2_N1_RP1
Detection of Man-In-The-Middle Attack In Computer Networks
Abdul-Mumin Salifu
Journal on Communication Engineering and Systems
2277-5242
2
1
1
8
Information Technology, Wireless Network, Attacker, IP, MAC, Denial of Service Attack, Session Hijacking, Man-In-The-Middle attack
In this paper, the author presented how Man-in-the-Middle problem can be executed by an attacker. He also proposed a simple and lightweight protocol that will make it undesirable for black hats to carry out this act. The proposed detection protocol has been simulated in a wireless environment to test the effectiveness of the detection mechanism. In all cases the simulated man-in-the-middle attack was detected. The performance of the proposed detection mechanism was evaluated against an existing detection mechanism.
November 2012 - January 2013
Copyright © 2013 i-manager publications. All rights reserved.
i-manager Publications
http://www.imanagerpublications.com/Article.aspx?ArticleId=2071