{"title":"基于单板计算机的Wi-Fi网络MITM攻击研究","authors":"Almaz F. Idiyatullin, Pavel E. Abdulkin","doi":"10.1109/ElConRus51938.2021.9396241","DOIUrl":null,"url":null,"abstract":"This article discusses the \"Man-In-the-Middle\" attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user’s data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.","PeriodicalId":447345,"journal":{"name":"2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer\",\"authors\":\"Almaz F. Idiyatullin, Pavel E. Abdulkin\",\"doi\":\"10.1109/ElConRus51938.2021.9396241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article discusses the \\\"Man-In-the-Middle\\\" attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user’s data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.\",\"PeriodicalId\":447345,\"journal\":{\"name\":\"2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)\",\"volume\":\"34 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-01-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ElConRus51938.2021.9396241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ElConRus51938.2021.9396241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer
This article discusses the "Man-In-the-Middle" attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user’s data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.