Understanding Man-in-the-middle-attack through Survey of Literature

These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the m...

Full description

Saved in:
Bibliographic Details
Published inIndonesian Journal of Computing, Engineering and Design Vol. 1; no. 1; pp. 44 - 56
Main Authors Mallik, A., Ahsan, A., Shahadat, M. M.Z., Tsou, J. C.
Format Journal Article
LanguageEnglish
Published Faculty of Engineering and Technology, Sampoerna University 21.04.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named MITM. This paper essentially includes the view of understanding the term of MITM; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on MITM recorded on 'Google Scholar'. The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.
ISSN:2656-1972
2656-8179
DOI:10.35806/ijoced.v1i1.36