TITLE

man-in-the-middle attack

PUB. DATE
April 2016
SOURCE
Computer Desktop Encyclopedia;Apr2016, p1
SOURCE TYPE
Encyclopedia
DOC. TYPE
Reference Entry
ABSTRACT
An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. A man-in-the-middle attack can be used to intercept an encrypted message exchange and spoof the recipient into thinking the message is intact from a legitimate sender. In such a case, the attackers replace the public key from the original sender with their own public key in order to decrypt the message that will be sent back from the unsuspecting recipient. See replay attack, public key cryptography and ARP cache poisoning.
ACCESSION #
114226078

 

Related Articles

  • MitM attack.  // Computer Desktop Encyclopedia;10/1/2011, p1 

    See man-in-the-middle attack.

  • MIM.  // Computer Desktop Encyclopedia;2015, p1 

    See man-in-the-middle attack.

  • MitM attack.  // Computer Desktop Encyclopedia;2015, p1 

    See man-in-the-middle attack.

  • Man-in-the-middle attack. Sanders, Geoff // SC Magazine: For IT Security Professionals (15476693);Feb2016, Vol. 27 Issue 2, p13 

    The article offers information on the cybersecurity attack called man-in-the-middle attack.

  • Analysis of Liberty Single-Sign-on with Enabled Clients. Pfitzmann, Birgit; Waidner, Michael // IEEE Internet Computing;Nov/Dec2003, Vol. 7 Issue 6, p38 

    Analyzes the security concerns regarding Web single-sign-on protocols from Liberty Alliance. Features of the Liberty-enabled client and proxy protocol (LECP); Information on the man-in-the-middle attacks against LECP protocol; Details on countermeasures against man-in-the-middle attacks.

  • Detecting and Locating Man-in-the-Middle Attacks in Fixed Wireless Networks. Ziqian Dong; Espejo, Randolph; Yu Wan; Wenjie Zhuang // Journal of Computing & Information Technology;2015, Vol. 23 Issue 4, p283 

    We propose a novel method to detect and locate a Man-in-the-Middle attack in a fixed wireless network by analyzing round-trip time and measured received signal strength from fixed access points. The proposed method was implemented as a client-side application that establishes a baseline for...

  • World-changing success story clicks for pioneers of messaging security. Chris Blackhurst // Evening Standard;10/ 3/2014, p52 

    UNTIL I met Professor Anthony Finkelstein and Paran Chandrasekaran, I'd not heard of the "man-inthe-middle attack", or MITM, for electronic messaging. I was familiar with eavesdropping, intercepting and hacking, but this was a new one on me.

  • New Year, New Hacks? Sausner, Rebecca // Bank Technology News;Jan2011, Vol. 24 Issue 1, p9 

    The article presents the author's views on the threats to banking industry such as the Zeus-style malware that results in man-in-the-middle attacks to online banking in the U.S.

  • man-in-the-middle attack.  // Computer Desktop Encyclopedia;2015, p1 

    An unauthorized interception of network traffic. The packets are viewed or modified by the perpetrator and sent on to the recipient, who is unaware of the intrusion. A man-in-the-middle attack can be used to intercept an encrypted message exchange and spo

  • BEST INNOVATIVE SERVICE.  // Money (Australia Edition);Dec2008, Issue 108, p105 

    The article reports on Newcastle Permanent Building Society's VerifID service which prevents threats, such as Man-in-the-Middle and Man-in-the-Browser attacks.

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics