RESEARCH OF THE SYSTEM FOR VULNERABILITY TO MITM – ATTACKS USING THE CREATION OF FAKE AP

Serhii Krivenko, Natalya Rotaniova, Yulianna Lazarevska, Ulyana Karpenko
{"title":"RESEARCH OF THE SYSTEM FOR VULNERABILITY TO MITM – ATTACKS USING THE CREATION OF FAKE AP","authors":"Serhii Krivenko, Natalya Rotaniova, Yulianna Lazarevska, Ulyana Karpenko","doi":"10.28925/2663-4023.2021.13.2938","DOIUrl":null,"url":null,"abstract":"The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as \"Man in the middle\" (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing \"Man in the middle\" attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2021.13.2938","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The problems of the cybersecurity are becoming a daily threat to the business sphere and the Internet users. The field of the cybersecurity is constantly changing, but it is obviously that the cyber threats are becoming more serious and occur more often. The statistics on the number of cyber attacks in 2020 showed a sharp surge in the cybercrime. In the field of the information security, the majority of incidents has been related to attacks on the various distributed information systems recently. At the same time, a significant amount number of the successful attacks are those that carried out using such attacks as "Man in the middle" (MITM). MITM - attacks are dangerous because with their help attackers gain access to the confidential information, not only the companies but also the ordinary users. Therefore, the purpose of this article is to study the types of MITM - attacks, as well as to develop the recommendations for combating such types of attacks. The study was conducted using methods of analysis and description. The object of the study is MITM attacks. The subject of the study is to determine ways to counter attacks such as MITM. As a result of the conducted research the basic types and the technique of carrying out MITM - attacks are considered. The result of the study was the development of the recommendations for the countering MITM attacks. The proposed methods of preventing "Man in the middle" attacks can ensure a certain high level of the computer network security. This study will be useful in ways suggested to prevent MITM attacks, not only for security administrators, but also for Wi-Fi users trying to protect their personal data. The results of the study can also be used to develop better software that can increase the security of any computer network
利用伪造ap的方法研究了系统易受mitm攻击的漏洞
网络安全问题日益成为商业领域和互联网用户的日常威胁。网络安全领域在不断变化,但显然网络威胁也越来越严重,发生的频率也越来越高。对2020年网络攻击数量的统计显示,网络犯罪急剧增加。在信息安全领域,近年来发生的大多数事件都与对各种分布式信息系统的攻击有关。与此同时,相当数量的成功攻击是利用“中间人”(MITM)等攻击进行的。MITM攻击是危险的,因为在他们的帮助下,攻击者不仅可以访问公司的机密信息,还可以访问普通用户的机密信息。因此,本文的目的是研究MITM攻击的类型,并提出打击此类攻击的建议。本研究采用分析和描述的方法进行。研究对象是MITM攻击。该研究的主题是确定对抗MITM等攻击的方法。在此基础上,对MITM攻击的基本类型和实施技术进行了研究。研究的结果是制定了应对MITM攻击的建议。所提出的防止“中间人”攻击的方法可以保证计算机网络的高水平安全性。这项研究不仅对安全管理员有用,而且对试图保护个人数据的Wi-Fi用户也有用。研究的结果也可以用来开发更好的软件,可以提高任何计算机网络的安全性
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信