In this paper, the author presented how Man-in-the-Middle problem can be executed by an attacker. He also proposed a simple and lightweight protocol that will make it undesirable for black hats to carry out this act. The proposed detection protocol has been simulated in a wireless environment to test the effectiveness of the detection mechanism. In all cases the simulated man-in-the-middle attack was detected. The performance of the proposed detection mechanism was evaluated against an existing detection mechanism.

">

Detection of Man-In-The-Middle Attack In Computer Networks

Salifu Abdul-Mumin*
University for Development Studies, Faculty of Mathematical Sciences, Department of Computer Science, Navrongo, Ghana.
Periodicity:November - January'2013
DOI : https://doi.org/10.26634/jcs.2.1.2071

Abstract

In this paper, the author presented how Man-in-the-Middle problem can be executed by an attacker. He also proposed a simple and lightweight protocol that will make it undesirable for black hats to carry out this act. The proposed detection protocol has been simulated in a wireless environment to test the effectiveness of the detection mechanism. In all cases the simulated man-in-the-middle attack was detected. The performance of the proposed detection mechanism was evaluated against an existing detection mechanism.

Keywords

Information Technology, Wireless network, Attacker, IP, MAC, Denial of service attack, Session Hijacking, Man-in-the-Middle attack.

How to Cite this Article?

Abdul-Mumin, S. (2013). Detection of Man-In-The-Middle Attack in Computer Networks. i-manager’s Journal on Communication Engineering and Systems, 2(1), 1-8. https://doi.org/10.26634/jcs.2.1.2071

References

[1]. Azzedine Boukerche -Security and Fraud Detection in Mobile and Wireless Networks
[2]. Daniel Sweeney (2006). Building 802.16 Wireless Networks, Second Edition.
[3]. Lam, K. & Leblanc, D. & Smith, K., (2006). Theft on The Web: Prevent Session Hijacking. Retrieved from the web 07/06/2009
[4]. Mary Landesman About.com Guide- Man in the Middle attack and Redirection
[5]. Plummer, D.C. (1982). An Ethernet Address Resolution Protocol-Converting Network Protocol to a 48 bit Ethernet Address for Transmission on Ethernet Hardware, RFC-826.
[6]. R. Rivest, (1982). The MDS message-digest algorithm, RFC286, Internet Engineering Task Force, Symbolic, Inc.
[7]. Sean Whalen (2001). Introduction to ARP Spoofing , April 2001.
[8]. Zouheir Trabelsi and Khaed Shuaib, Spoofed ARP Packets Detection in Switched LAN Networks.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.