Analysis of a Man-in-the-Middle Experiment with Wireshark

نویسندگان

  • Ming-Hsing Chiu
  • Kuo-Pao Yang
  • Randall Meyer
  • Tristan Kidder
چکیده

With the rapid growth of the Internet user population and the magnitude of the applications depending on the Internet these days, network security measures are becoming extremely important. For the Internet users, one of the best defenses against network attacks is to understand the patterns of the attacks and raise the awareness of abnormality as much as possible. In this paper, an experiment was employed to demonstrate a form of active attacks, called Man-in-the-middle (MITM) attack, in which the entire communication between the victims is controlled by the attacker. A detailed description of setting up the system for MITM is included. The victim initiated a few activities that cause the attacks, which were captured by Wireshark at the attacker site and analyzed. The result clearly reveals the pattern of the MITM attack. Some remarks on the preventive measures were made based on the result.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Man-In-The-Middle Attack Against Modbus TCP Illustrated with Wireshark

Though attacks on the industrial control system (ICS) and their protocols are not a new occurrence, recent years have highlighted a growing trend in such attacks. To make matters worse, cyber defenders have also dealt with a slow migration to more secure ICS protocols due to costs associated with equipment downtime. With the increase in attacks and the slow migration to more secure ICS protocol...

متن کامل

Wireless Network Security Using Raspberry Pi

This educational project uses a second generation Raspberry Pi that runs multiple Open Source software packages, to perform network penetration testing and to analyze the results. Implementing this project provides undergraduate students with practical hands-on experience and explains advanced concepts in computer hardware, operating systems, and network security. This project is fairly afforda...

متن کامل

An Integrated Approach to ARP Poisoning and its Mitigation using Empirical Paradigm

The primary objective of Cyber Security is to protect data in transit. If a network is vulnerable at layer two, the good fortune opens wide up for an attacker. With the easy availability of refined offensive tools that can exploit these vulnerabilities to create havoc in networks, there is a dire need of mitigative measures that can cope up with increasing threats. ARP Protocol violation is amo...

متن کامل

A middle age addicted man with caustic stomach

Background: The term caustic generally refers to alkaline and the term corrosive generally refers to acidic agents' injury however, in medical literature caustic is frequently a term applied to both substances. Ingested alkali typically damage the esophagus more than stomach or duodenum, whereas acids usually cause more severe gastric injury. Since esophagus has a slightly alkaline pH, its epit...

متن کامل

Coexistance of Pemphigus Vulgaris and Psoriasis in a Middle Aged Man

Psoriasis and pemphigus vulgaris are two inflammatory and autoimmune diseases. Their concomitant occurrence in one patient is very rare. We describe a 57-year-old patient with a history of severe plaque type psoriasis for 2 years. After a few months, he presented with disseminated bullae and mucosal erosions which were documented as pemphigus vulgaris. Both of the diseases were successfully con...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011