JCS_V2_N1_RP1 Detection of Man-In-The-Middle Attack In Computer Networks Abdul-Mumin Salifu Journal on Communication Engineering and Systems 2277-5242 2 1 1 8 Information Technology, Wireless Network, Attacker, IP, MAC, Denial of Service Attack, Session Hijacking, Man-In-The-Middle attack In this paper, the author presented how Man-in-the-Middle problem can be executed by an attacker. He also proposed a simple and lightweight protocol that will make it undesirable for black hats to carry out this act. The proposed detection protocol has been simulated in a wireless environment to test the effectiveness of the detection mechanism. In all cases the simulated man-in-the-middle attack was detected. The performance of the proposed detection mechanism was evaluated against an existing detection mechanism. November 2012 - January 2013 Copyright © 2013 i-manager publications. All rights reserved. i-manager Publications http://www.imanagerpublications.com/Article.aspx?ArticleId=2071