A Survey of Man In The Middle Attacks

  title={A Survey of Man In The Middle Attacks},
  author={Mauro Conti and Nicola Dragoni and Viktor Lesyk},
  journal={IEEE Communications Surveys \& Tutorials},
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two… 

Case Study:Comparative Analysis of Man-In-The-Middle-Attacks and Preventive Measures.

An exhaustive study on MITM attack and analysis their types, including penetration testing and cryptography technique, which helps to secure networks, and highlights the security issues.

Man in the Middle Attacks: Analysis, Motivation and Prevention

This paper aims to present some of mechanism for the prevention of Man in the Middle attacks and to identify some of the future research directions in such area.

Multi-Channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks: A State of the Art Review

The capabilities of Multi-Channel MitM are evaluated and every reported attack in the state of the art is reviewed, including cipher downgrades, denial of service, key reinstallation attacks, and recently FragAttacks in 2021 are reviewed.

Browser-in-the-Middle (BitM) attack

Modelling and describing a new method of attack, named Browser-in-the-Middle (BitM), which, despite the similarities with MitM in the way it controls the data flow between a client and the service it accesses, bypasses some of MitM’s typical shortcomings.

Understanding Man-in-the-middle-attack through Survey of Literature

The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem.

Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools

This work demonstrates the MITM attack over secure network connections and rerouting of all the traffic from victim's machine towards the attacker's machine.

A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer

The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack, including the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.

Man in the Middle: Attack and Protection

The current situation of cybersecurity and usage of Man-In-TheMiddle attacks, what constitutes a proper MITM attack, why this approach is chosen among many other options, how such an attack is implemented in a real-life scenario and how to achieve maximal protection for both individuals and systems are explored.

Vulnerability Assessment and Evaluation of Associated Attacks on Physical and Virtual Networks

The research concluded that when strong cryptographic algorithms for key generation such as Diffie-Hellman and Blowfish algorithm for data encryption are rooted in the network either during configuration or during configuration, the security of data over SSL and HTTPs of such a network can be greatly enhanced and vulnerabilities greatly reduced.

Real-World Man-in-the-Middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use

This paper attempts to implement the Man-in-the-middle (MITM) attack for instructional use in an academic setup for teaching a foundational cybersecurity course using the open source Ettercap tool in Kali Linux environment.



Analysis of a Man-inthe-Middle Experiment with Wireshark

An experiment was employed to demonstrate a form of active attacks, called Man-in-the-middle (MITM) attack, in which the entire communication between the victims is controlled by the attacker.

A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments

  • J. BelenguerC. M. Calafate
  • Computer Science
    The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
  • 2007
This work presents a low-cost embedded IDS which is able to detect and/or prevent MitM attacks automatically and efficiently and can be produced at a very low cost, which is attractive for large scale production and deployment.

Using JPCAP to Prevent Man-in-the-Middle Attacks in a Local Area Network Environment

The methodology to prevent MITM attacks conducted by ARP spoofing is to first assign unique IP addresses to every node on the local area network (LAN) based upon their MAC address.

A man-in-the-middle attack on UMTS

A man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies, is presented, showing that an attacker can mount an impersonation attack since GSM base stations do not support integrity protection.

Different flavours of Man-In-The-Middle attack, consequences and feasible solutions

Different types of MITM attacks, their consequences and feasible solutions under different circumstances are emphasized giving users options to choose one from various solutions.

Stealth and semi-stealth MITM attacks, detection and defense in IPv4 networks

This paper proposes two new attacks namely Stealth MITM(SMITM) and Semi-Stealth MITM (SSMITM) at the Data Link Layer using ARP Spoofing which add stealth capabilities to MITM attacks, thereby concealing the identity of an attacker.

A Survey on Man in the Middle Attack

This survey paper on man in the middle attack focuses on the execution of man inThe middle attack on Diffie-Hellman and what are the different methods with which it can be performed and the various defenses against the attack.

On the Effective Prevention of TLS Man-in-the-Middle Attacks in Web Applications

This paper uses Channel ID-based authentication in combination with server invariance to create a novel mechanism that is called SISCA: Server Invariance with Strong Client Authentication, which resists user impersonation via TLS MITM attacks, regardless of how the attacker is able to successfully achieve server impersonation.

X.509 Forensics: Detecting and Localising the SSL/TLS Men-in-the-Middle

The development and deployment of Crossbear is reported on, a tool to detect MitM attacks on SSL/TLS and localise their position in the network with a fair degree of confidence and the degree of effectivity that Crossbear achieves against attackers of different kinds and strengths is analysed.

On the impact of GSM encryption and man-in-the-middle attacks on the security of interoperating GSM/UMTS networks

  • Ulrike MeyerS. Wetzel
  • Computer Science
    2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications (IEEE Cat. No.04TH8754)
  • 2004
To protect UMTS connections from GSM attacks by integrating an additional authentication and key agreement on intersystem handovers between GSM and UMTS.