A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer

被引:1
作者
Idiyatullin, Almaz [1 ]
Abdulkin, Pavel E. [1 ]
机构
[1] Natl Res Nucl Univ MEPhI, Moscow Engn Phys Inst, Dept Comp Syst & Technol, Moscow, Russia
来源
PROCEEDINGS OF THE 2021 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (ELCONRUS) | 2021年
关键词
Man-In-The-Middle attack; Security; MITM; Raspberry Pi; Information security; Cyberattacks; Spoofing; ARP;
D O I
10.1109/ElConRus51938.2021.9396241
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This article discusses the "Man-In-the-Middle" attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user's data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.
引用
收藏
页码:396 / 400
页数:5
相关论文
共 10 条
  • [1] Arunraja A., 2019, INT J SCI TECHNOL RE, V8
  • [2] A Survey of Man In The Middle Attacks
    Conti, Mauro
    Dragoni, Nicola
    Lesyk, Viktor
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (03): : 2027 - 2051
  • [3] El Fiorenza J. C., 2019, INT J INNOV TECHNOL, V9, DOI [10.35940/ijitee.A4684.119119, DOI 10.35940/IJITEE.A4684.119119]
  • [4] Elkilani W. S., 2014, INT J ADV COMPUT SCI, V5, DOI [10.14569/ijacsa.2014.050114, DOI 10.14569/IJACSA.2014.050114]
  • [5] Guleci M., 2017, ANDROID BASED WI FI, DOI [10.1109/UBMK.2017.8093402, DOI 10.1109/UBMK.2017.8093402]
  • [6] Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA
    Hong, Seungpyo
    Oh, Myeungjin
    Lee, Sangjun
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 254 - 260
  • [7] Kiranmayi G. S., 2020, INT J MOD TRENDS SCI, V6, DOI [10.46501/ijmtst060613, DOI 10.46501/IJMTST060613]
  • [8] Development of a Robotic Airboat for Online Water Quality Monitoring in Lakes
    Melo, Marcelo
    Mota, Francisco
    Albuquerque, Victor
    Alexandria, Auzuir
    [J]. ROBOTICS, 2019, 8 (01):
  • [9] Rajalingam, 2018, J ADV RES DYN CONTRO, V10, P1721, DOI DOI 10.35940/IJITEE.G5645.059720
  • [10] Securing ARP and DHCP for mitigating link layer attacks
    Younes, Osama S.
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2017, 42 (12): : 2041 - 2053