Публікація: A simulation-based performance comparison study of a man-on-the-side attack based on ARP spoofing, its detection, and prevention
dc.contributor.author | Kashaija Joel | |
dc.date.accessioned | 2022-12-24T19:12:28Z | |
dc.date.available | 2022-12-24T19:12:28Z | |
dc.date.issued | 2022 | |
dc.description.abstract | The work describes a simulation-based performance comparison study of a Man-on-the-Side attack based on ARP spoofing, its detection, and prevention. Using Wireshark as the deep packet analyzer, we performed a Man-on-the-Side attack leveraging the ARP spoofing table, showing the real environment created to simulate a Man-on-the-Side attack. The presented sample revealed how a MotS attack could quickly get the password from an unsecured login. The two frames from the victim and the attacker's relay to the website have been displayed. | |
dc.identifier.citation | Kashaija Joel A simulation-based performance comparison study of a Man-On-The-Side attack based on arp spoofing, its detection, and prevention / Kashaija Joel // Проблеми електромагнітної сумісності перспективних безпроводових мереж зв’язку (EМС-2022) : матеріали восьмої Міжнародної науково-технічної конференції, 24–25 листопада 2022 р. – Харків, ХНУРЕ, 2022. – С. 84-85. | |
dc.identifier.uri | https://openarchive.nure.ua/handle/document/21187 | |
dc.language.iso | en | |
dc.publisher | ХНУРЕ | |
dc.subject | Simulation, Man-on-the-Side attack, ARP spoofing | |
dc.title | A simulation-based performance comparison study of a man-on-the-side attack based on ARP spoofing, its detection, and prevention | |
dc.type | Conference proceedings | |
dspace.entity.type | Publication |
Файли
Оригінальний пакет
1 - 1 з 1
Завантаження...
- Назва:
- 28_Kashaija.pdf
- Розмір:
- 814.45 KB
- Формат:
- Adobe Portable Document Format
Ліцензійний пакет
1 - 1 з 1
Немає доступних мініатюр
- Назва:
- license.txt
- Розмір:
- 9.64 KB
- Формат:
- Item-specific license agreed upon to submission
- Опис: