Man-in-the-middle-attack: Understanding in simple words
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-a...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Growing Science
2019-06-01
|
Series: | International Journal of Data and Network Science |
Subjects: | |
Online Access: | http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf |
id |
doaj-761b23b04ecc4109bfe2761d3fcb58b4 |
---|---|
record_format |
Article |
spelling |
doaj-761b23b04ecc4109bfe2761d3fcb58b42020-11-25T00:46:27ZengGrowing ScienceInternational Journal of Data and Network Science2561-81482561-81562019-06-0132779210.5267/j.ijdns.2019.1.001Man-in-the-middle-attack: Understanding in simple wordsAvijit MallikAbid AhsanMhia Md. Zaglul Shahadat Jia-Chi Tsou These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just real-ized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related da-ta/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdfMITM attackCyberattackCrimeMedia |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Avijit Mallik Abid Ahsan Mhia Md. Zaglul Shahadat Jia-Chi Tsou |
spellingShingle |
Avijit Mallik Abid Ahsan Mhia Md. Zaglul Shahadat Jia-Chi Tsou Man-in-the-middle-attack: Understanding in simple words International Journal of Data and Network Science MITM attack Cyberattack Crime Media |
author_facet |
Avijit Mallik Abid Ahsan Mhia Md. Zaglul Shahadat Jia-Chi Tsou |
author_sort |
Avijit Mallik |
title |
Man-in-the-middle-attack: Understanding in simple words |
title_short |
Man-in-the-middle-attack: Understanding in simple words |
title_full |
Man-in-the-middle-attack: Understanding in simple words |
title_fullStr |
Man-in-the-middle-attack: Understanding in simple words |
title_full_unstemmed |
Man-in-the-middle-attack: Understanding in simple words |
title_sort |
man-in-the-middle-attack: understanding in simple words |
publisher |
Growing Science |
series |
International Journal of Data and Network Science |
issn |
2561-8148 2561-8156 |
publishDate |
2019-06-01 |
description |
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just real-ized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle-attack’ (MITM/MIM). This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related da-ta/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'. |
topic |
MITM attack Cyberattack Crime Media |
url |
http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf |
work_keys_str_mv |
AT avijitmallik maninthemiddleattackunderstandinginsimplewords AT abidahsan maninthemiddleattackunderstandinginsimplewords AT mhiamdzaglulshahadat maninthemiddleattackunderstandinginsimplewords AT jiachitsou maninthemiddleattackunderstandinginsimplewords |
_version_ |
1725265412836294656 |