| dc.contributor.author | Islam, Md. Manirul | |
| dc.contributor.author | Nayem, Md. Jannatul | |
| dc.contributor.author | Mondol, Md. Rezwan | |
| dc.date.accessioned | 2020-01-23T11:33:17Z | |
| dc.date.available | 2020-01-23T11:33:17Z | |
| dc.date.issued | 2019-04 | |
| dc.identifier.uri | http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/3625 | |
| dc.description.abstract | At present wireless network trends to be more and more popular among the population with the millions of users. The Man-In-The-Middle (MITM) attack is one of the most well-known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. MITM has been one kind of attack where a user gets between the sender and the receiver information. In this report we try to explain different types of MITM attacks. Man in the Middle (MITM) attack is one of the primary techniques in computer base hacking. In this types of attack where the attackers can collect many important data, inject false information, user lost their different types of online user ID and password. For this, we try to discover how this types of attack works, describe a method of man-in-the-middle attack based on ARP spoofing and try to create a method of preventing suck attack. | en_US |
| dc.language.iso | en_US | en_US |
| dc.publisher | Daffodil International University | en_US |
| dc.relation.ispartofseries | ;P13343 | |
| dc.subject | Computer science | en_US |
| dc.subject | Computer network protocol | en_US |
| dc.subject | Computer security | en_US |
| dc.title | Preventing Man in the Middle (MITM) Attack for Securing Network | en_US |
| dc.type | Other | en_US |