DSpace Repository

Preventing Man in the Middle (MITM) Attack for Securing Network

Show simple item record

dc.contributor.author Islam, Md. Manirul
dc.contributor.author Nayem, Md. Jannatul
dc.contributor.author Mondol, Md. Rezwan
dc.date.accessioned 2020-01-23T11:33:17Z
dc.date.available 2020-01-23T11:33:17Z
dc.date.issued 2019-04
dc.identifier.uri http://dspace.daffodilvarsity.edu.bd:8080/handle/123456789/3625
dc.description.abstract At present wireless network trends to be more and more popular among the population with the millions of users. The Man-In-The-Middle (MITM) attack is one of the most well-known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. MITM has been one kind of attack where a user gets between the sender and the receiver information. In this report we try to explain different types of MITM attacks. Man in the Middle (MITM) attack is one of the primary techniques in computer base hacking. In this types of attack where the attackers can collect many important data, inject false information, user lost their different types of online user ID and password. For this, we try to discover how this types of attack works, describe a method of man-in-the-middle attack based on ARP spoofing and try to create a method of preventing suck attack. en_US
dc.language.iso en_US en_US
dc.publisher Daffodil International University en_US
dc.relation.ispartofseries ;P13343
dc.subject Computer science en_US
dc.subject Computer network protocol en_US
dc.subject Computer security en_US
dc.title Preventing Man in the Middle (MITM) Attack for Securing Network en_US
dc.type Other en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Browse

My Account

Statistics