3.8 Proceedings Paper

A Research of MITM Attacks in Wi-Fi Networks Using Single-board Computer

出版社

IEEE
DOI: 10.1109/ElConRus51938.2021.9396241

关键词

Man-In-The-Middle attack; Security; MITM; Raspberry Pi; Information security; Cyberattacks; Spoofing

向作者/读者索取更多资源

This article discusses the significance and implementation process of Man-In-the-Middle attack in computer security, proposes methods to counter the attack, and emphasizes the threat it poses to the security of Wi-Fi networks.
This article discusses the Man-In-the-Middle attack, one of the most famous attacks in the field of computer security, which causes some difficulties even for security professionals. The attack is aimed at violating the confidentiality and integrity of the user's data on the network. Despite the fact that there are a lot of methods to counter the MITM attack, it is still an actual problem and remains one of the most promising topics for research activities. The purpose of the research is to analyze various types of MITM attack that will demonstrate weaknesses in the security of Wi-Fi networks. The article describes how to implement MITM attack using different utilities and presents materials demonstrating realization of this attack. It shows the use of a remote connection to a single-board computer like a Raspberry Pi and the possibilities of using it in listening to user information via Wi-Fi networks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据