RESEARCH OF THE SYSTEM FOR VULNERABILITY TO MITM – ATTACKS USING THE CREATION OF FAKE AP

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.13.2938

Keywords:

cyber attack, MITM-attack; access point; Fake AP; SSL; WPA; SSID; MITM-attack prevention

Abstract

The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as "Man in the middle" (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing "Man in the middle" attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network

Downloads

Download data is not yet available.

References

Understanding Man-In-The-Middle Attacks - Part 3: Session Hijacking. TechGenix. https://techgenix.com/understanding-man-in-the-middle-attacks-arp-part3/

Vallivaara, V. (2014). Detecting Man-in-the-Middle Attacks on Non-Mobile Systems. ACM conference on data and application security and privacy : Proceedings of the 4th, San Antonio, 3 March 2014 / ed. by M. Sailio, K. Halunen. San Antonio Texas, 130–133

Al Abri, D. (2015). Detection of MITM attack in LAN environment using payload matching. У 2015 IEEE International Conference on Industrial Technology (ICIT). IEEE. https://doi.org/10.1109/icit.2015.7125367

Mallik, A. (2019). MAN-IN-THE-MIDDLE-ATTACK: UNDERSTANDING IN SIMPLE WORDS. Cyberspace: Jurnal Pendidikan Teknologi Informasi, 2(2), 109. https://doi.org/10.22373/cj.v2i2.3453

Bakhareva, N. F., Tarasov, V. N., Shukhman, A. E., Polezhaev, P. N., Ushakov, Yu. A., Matveev, A. A. (2018). Vыiavlenye atak v korporatyvnыkh setiakh s pomoshchiu metodov mashynnoho obuchenyia. Sovremennыe ynformatsyonnыe tekhnolohyy y YT-obrazovany, (3), 626-632. https://cyberleninka.ru/article/n/vyyavlenie-atak-v-korporativnyh-setyah-s-pomoschyu-metodov-mashinnogo-obucheniya

Havrylova, E. A. (2017). Yssledovanye metodov obnaruzhenyia setevыkh atak. Nauchnыe zapysky molodыkh yssledovatelei, (4), 55-58. https://cyberleninka.ru/article/n/issledovanie-metodov-obnaruzheniya-setevyh-atak

Thing, V. L. L. (2017). IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach. У 2017 IEEE Wireless Communications and Networking Conference (WCNC). IEEE. https://doi.org/10.1109/wcnc.2017.7925567

Bodström, T., & Hämäläinen, T. (2018). State of the Art Literature Review on Network Anomaly Detection with Deep Learning. У Lecture Notes in Computer Science (с. 64–76). Springer International Publishing. https://doi.org/10.1007/978-3-030-01168-0_7

Aygun, R. C., & Yavuz, A. G. (2017). Network Anomaly Detection with Stochastically Improved Autoencoder Based Models. У 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud). IEEE. https://doi.org/10.1109/cscloud.2017.39

Yvanov, O. Vse ob atake "Chelovek poseredyne" (Man in the Middle, MitM). https://www.antimalware.ru/analytics/Threats_Analysis/man-in-the-middle-attack

Lake, J. ARP poisoning/spoofing: How to detect & prevent it. Comparitech. https://www.comparitech.com/blog/vpn-privacy/arp-poisoning-spoofing-detect-prevent

Salihoglu M. Poisoning Attacks, Round 2: Beyond NetBIOS and LLMNR. https://www.crowe.com/cybersecurity-watch/poisoning-attacks-round-2-beyond-netbios-llmnr

What is DNS spoofing Man in The Middle Attack?| Security Wiki. Secret Double Octopus. https://doubleoctopus.com/security-wiki/threats-and-tools/dns-spoofing

What is DNS Cache Poisoning and DNS Spoofing? https://www.kaspersky.com/resource-center/definitions/dns

Contributors to Wikimedia projects. Rogue access point - Wikipedia. Wikipedia, the free encyclopedia. https://en.wikipedia.org/wiki/Rogue_access_point

Baxter, K. Evil Twin Attack - Firewalls.com. https://www.firewalls.com/blog/security-terms/evil-twin-attack

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack. WonderHowTo. https://null-byte.wonderhowto.com/how-to/hack-wi-fi-stealing-wi-fi-passwords-with-evil-twin-attack-0183880

Downloads


Abstract views: 812

Published

2021-09-30

How to Cite

Krivenko, S., Rotaniova , N. ., Lazarevska, Y., & Karpenko , U. . (2021). RESEARCH OF THE SYSTEM FOR VULNERABILITY TO MITM – ATTACKS USING THE CREATION OF FAKE AP. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(13), 29–38. https://doi.org/10.28925/2663-4023.2021.13.2938