期刊
出版社
IEEE
DOI: 10.1109/ElConRus51938.2021.9396241
关键词
Man-In-The-Middle attack; Security; MITM; Raspberry Pi; Information security; Cyberattacks; Spoofing
This article discusses the significance and implementation process of Man-In-the-Middle attack in computer security, proposes methods to counter the attack, and emphasizes the threat it poses to the security of Wi-Fi networks.
This article discusses the Man-In-the-Middle attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user's data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据