Man-in-the-middle-attack: Understanding in simple words

These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-a...

Full description

Bibliographic Details
Main Authors: Avijit Mallik, Abid Ahsan, Mhia Md. Zaglul Shahadat, Jia-Chi Tsou
Format: Article
Language:English
Published: Growing Science 2019-06-01
Series:International Journal of Data and Network Science
Subjects:
Online Access:http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf
id doaj-761b23b04ecc4109bfe2761d3fcb58b4
record_format Article
spelling doaj-761b23b04ecc4109bfe2761d3fcb58b42020-11-25T00:46:27ZengGrowing ScienceInternational Journal of Data and Network Science2561-81482561-81562019-06-0132779210.5267/j.ijdns.2019.1.001Man-in-the-middle-attack: Understanding in simple wordsAvijit MallikAbid AhsanMhia Md. Zaglul Shahadat Jia-Chi Tsou These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just real-ized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related da-ta/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdfMITM attackCyberattackCrimeMedia
collection DOAJ
language English
format Article
sources DOAJ
author Avijit Mallik
Abid Ahsan
Mhia Md. Zaglul Shahadat
Jia-Chi Tsou
spellingShingle Avijit Mallik
Abid Ahsan
Mhia Md. Zaglul Shahadat
Jia-Chi Tsou
Man-in-the-middle-attack: Understanding in simple words
International Journal of Data and Network Science
MITM attack
Cyberattack
Crime
Media
author_facet Avijit Mallik
Abid Ahsan
Mhia Md. Zaglul Shahadat
Jia-Chi Tsou
author_sort Avijit Mallik
title Man-in-the-middle-attack: Understanding in simple words
title_short Man-in-the-middle-attack: Understanding in simple words
title_full Man-in-the-middle-attack: Understanding in simple words
title_fullStr Man-in-the-middle-attack: Understanding in simple words
title_full_unstemmed Man-in-the-middle-attack: Understanding in simple words
title_sort man-in-the-middle-attack: understanding in simple words
publisher Growing Science
series International Journal of Data and Network Science
issn 2561-8148
2561-8156
publishDate 2019-06-01
description These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just real-ized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related da-ta/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.
topic MITM attack
Cyberattack
Crime
Media
url http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf
work_keys_str_mv AT avijitmallik maninthemiddleattackunderstandinginsimplewords
AT abidahsan maninthemiddleattackunderstandinginsimplewords
AT mhiamdzaglulshahadat maninthemiddleattackunderstandinginsimplewords
AT jiachitsou maninthemiddleattackunderstandinginsimplewords
_version_ 1725265412836294656