从文学考察看中间人的进攻

Avijit Mallik, Abid Ahsan, M. Shahadat, J. Tsou
{"title":"从文学考察看中间人的进攻","authors":"Avijit Mallik, Abid Ahsan, M. Shahadat, J. Tsou","doi":"10.35806/ijoced.v1i1.36","DOIUrl":null,"url":null,"abstract":"These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named MITM. This paper essentially includes the view of understanding the term of MITM; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on MITM recorded on 'Google Scholar'. The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.","PeriodicalId":34235,"journal":{"name":"Indonesian Journal of Computing Engineering and Design","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2019-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Understanding Man-in-the-middle-attack through Survey of Literature\",\"authors\":\"Avijit Mallik, Abid Ahsan, M. Shahadat, J. Tsou\",\"doi\":\"10.35806/ijoced.v1i1.36\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named MITM. This paper essentially includes the view of understanding the term of MITM; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on MITM recorded on 'Google Scholar'. The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.\",\"PeriodicalId\":34235,\"journal\":{\"name\":\"Indonesian Journal of Computing Engineering and Design\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Indonesian Journal of Computing Engineering and Design\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.35806/ijoced.v1i1.36\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Indonesian Journal of Computing Engineering and Design","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.35806/ijoced.v1i1.36","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

如今,网络攻击是一种严重的刑事犯罪,也是一个备受争议的问题。中间人攻击(MITM)是一种网络攻击,一个未经批准的局外人在两个用户之间进行在线通信,然后逃离双方。处于中间攻击的恶意软件经常监视和更改两个用户刚刚实现的个人/分类信息。中间人攻击作为一种协议,在系统内部受到局外人的攻击,局外人可以访问、读取和更改秘密信息,而不需要任何操纵。这个问题非常严重,大多数没有良好身份验证安全性的加密系统都可能被名为MITM的恶意软件入侵。本文主要包括对MITM术语的理解;目前的工作主要是在一篇文章中积累相关的数据/信息,以便在学院/本科生层面上对该主题进行进一步的研究。本文同样审计了“谷歌学者”上记录的关于MITM的大多数被引用的研究和调查文章。结果表明,MITM与用户行为具有相关性,在解决这一问题的方法中,必须考虑并仔细理解这一点。本文的动机是帮助读者理解和熟悉“中间人攻击”这一主题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Understanding Man-in-the-middle-attack through Survey of Literature
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named MITM. This paper essentially includes the view of understanding the term of MITM; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on MITM recorded on 'Google Scholar'. The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
14
审稿时长
20 weeks
期刊最新文献
A Review on Dynamic Network Using Flexible Active-Mode Period Scheme for Telemedicine Preservation of West Java Culinary Recipe Using Augmented Reality, Photogrammetry, and Storytelling Illustration A Systematic Literature Review of Sustainable Manufacturing: Green Manufacturing Practices in Asia Improvement in the Reinforced Concrete Beam with Embedded Polystyrene under Static Load Webtoon Pupus Putus Sekolah as The Educational Media of Gender Equality for Young Generation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1