抽象的な

ANALYSIS OF MITM ATTACK IN SECURE SIMPLE PAIRING

Praveen Kumar Mishra

This paper explain on different types of MITM attacks, their consequences, techniques and solutions under different circumstances giving users options to choose one from various solutions. Man-In-The-Middle (MITM) attack is one of the primary techniques in computer based hacking. MITM attack can successfully invoke attacks such as Denial of service, DNS spoofing and Port stealing. MITM attack of every kind has lot of surprising consequences in store for users such as, stealing online account user id, password, stealing of local ftp id, or telnet session etc. Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks. a new method is proposed in this paper to secure the exchange of public keys in SSP. By adopting the proposed technique, the exchange of public key becomes more secure and consequently, the process of SSP will be secure, reliable and provide protection against Man-In-The-Middle (MITM) attacks

免責事項: この要約は人工知能ツールを使用して翻訳されており、まだレビューまたは確認されていません