Understanding Man-in-the-middle-attack through Survey of Literature
These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the m...
Saved in:
Published in | Indonesian Journal of Computing, Engineering and Design Vol. 1; no. 1; pp. 44 - 56 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Faculty of Engineering and Technology, Sampoerna University
21.04.2019
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | These days cyberattack is a serious criminal offense and it is a hotly debated issue moreover. A man-in-the-middle-attack (MITM) is a kind of cyberattack where an unapproved outsider enters into an online correspondence between two users, remains escaped the two parties. The malware that is in the middle-attack often monitors and changes individual/classified information that was just realized by the two users. A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having a decent authentication security are threatened to be hacked by the malware named MITM. This paper essentially includes the view of understanding the term of MITM; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level. This paper likewise audits most cited research and survey articles on MITM recorded on 'Google Scholar'. The result showed that the MITM has correlation to the user behavior, in which this must be considered and careful understood for the way how to solve this problem. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'. |
---|---|
ISSN: | 2656-1972 2656-8179 |
DOI: | 10.35806/ijoced.v1i1.36 |