A Review of Man-in-the-Middle Attacks
نویسنده
چکیده
This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking. Introduction Man-in-the-Middle (MIM) attacks make the task of keeping data secure and private particularly challenging since attacks can be mounted from remote computers with fake addresses. Whereas communications security was primarily that of breaking of encryption transformations (as in the case of the Enigma machine during the Second World War [1]), the problem of security in computer networks also involves active interference by intruders, and of these MIM attack is one of the most spectacular. The MIM attack takes advantage of the weaknesses in the authentication protocols being used by the communicating parties. Since authentication is generally provided by third parties who issue certificates, the system of certificate generation becomes another source of potential weakness. The MIM attack allows the intruder or the unauthorized party to snoop on data through the backdoor. This intervention is also being used by companies to pry upon their employees and for adware. For example, in early 2015, it was discovered that Lenovo computers came preinstalled with adware called Superfish that injects advertising on browsers such as Google Chrome and Internet Explorer. Superfish installs a self-generated root certificate into the Windows certificate store and then resigns all SSL certificates presented by HTTPS sites with its own certificate. This could allow hackers to potentially steal sensitive data like banking credentials or to spy on the users’ activities [2]. Cryptographic protocols designed to provide communications security over a computer network are a part of Transport Layer Security (TLS). These protocols use X.509 which is an ITU-T standard that specifies standard formats for public key certificates, certificate revocation lists, attribute certificates, and a certification path validation algorithm [3]. The X.509 certificates are used for authentication the counterparty and to negotiate a symmetric key. As mentioned, certificate authorities are a weak link within the security system. In electronic mail, although servers do require SSL encryption, contents are processed and stored in plaintext on the servers. Google and Mozilla recently announced that they would stop accepting certificates issue by CNNIC (China Internet Network Information Center) [4]. According to Google’s Security Blog [5]: On Friday, March 20th, we became aware of unauthorized digital certificates for several Google domains. The certificates were issued by an intermediate certificate authority apparently held by a company called MCS Holdings. This intermediate certificate was issued by CNNIC. CNNIC is included in all major root stores and so the misissued certificates would be trusted by almost all browsers and operating systems. ... We promptly alerted CNNIC and other major browsers about the incident, and we
منابع مشابه
A TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کاملPolitical Stability, Corruption, Democracy and Terrorism In the Middle East and North Africa
Terrorism has been considered as a challenge with serious effect in the world as a result of instability, corruption and lack of democracy in most countries. Confronting this phenomenon requires recognizing its roots to find possible solutions. This study aims to examine the effect of some actual factors which causes the terrorism in short and long run. To this end, investigation has been condu...
متن کاملThe Role of Authentication Tokens in Preventing Man-in-the-Middle Attacks
Security threats and potential breaches can stem from a wide variety of vulnerabilities, ranging from simple password theft or spyware to Trojan horses, keyword sniffers and more. But the tactic that combines high levels of deception, great potential risk of loss and broad distribution is a new form of “man-in-themiddle” attack—real-time phishing. Man-in-the-middle attacks are not new—they’ve b...
متن کاملEfficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks
Efficient Cryptographic Protocols Preventing “Man-in-the-Middle” Attacks
متن کاملTowards Understanding Man-in-the-middle Attacks on IEC 60870-5-104 SCADA Networks
This paper investigates cyber attacks on ICS which rely on IEC 60870-5-104 for telecontrol communications. The main focus of the paper is on man-in-the-middle attacks, covering modification and injection of commands, it also details capture and replay attacks. An initial set of attacks are preformed on a local software simulated laboratory. Final experiments and validation of a man-in-the-middl...
متن کاملNew Fixed Point Attacks on GOST2 Block Cipher
GOST block cipher designed in the 1970s and published in 1989 as the Soviet and Russian standard GOST 28147-89. In order to enhance the security of GOST block cipher after proposing various attacks on it, designers published a modified version of GOST, namely GOST2, in 2015 which has a new key schedule and explicit choice for S-boxes. In this paper, by using three exactly identical portions of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1504.02115 شماره
صفحات -
تاریخ انتشار 2015