Man-in-the-middle-attack: Understanding in simple words
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-a...
Main Authors: | Avijit Mallik, Abid Ahsan, Mhia Md. Zaglul Shahadat, Jia-Chi Tsou |
---|---|
Format: | Article |
Language: | English |
Published: |
Growing Science
2019-06-01
|
Series: | International Journal of Data and Network Science |
Subjects: | |
Online Access: | http://www.growingscience.com/ijds/Vol3/ijdns_2019_10.pdf |
Similar Items
-
Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques
by: Wang, Le
Published: (2013) -
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions
by: Jian Guo, et al.
Published: (2017-02-01) -
Provably curb man-in-the-middle attack-based ARP spoofing in a local network
by: Hussain, M.A, et al.
Published: (2022) -
INVESTIGASI LIVE FORENSIK DARI SISI PENGGUNA UNTUK MENGANALISA SERANGAN MAN IN THE MIDDLE ATTACK BERBASIS EVIL TWIN
by: Muhammad Sabri Ahmad, et al.
Published: (2017-04-01) -
An Efficient Web Authentication Mechanism Preventing Man-In-The-Middle Attacks in Industry 4.0 Supply Chain
by: Alireza Esfahani, et al.
Published: (2019-01-01)