Kashaija Joel2022-12-242022-12-242022Kashaija Joel A simulation-based performance comparison study of a Man-On-The-Side attack based on arp spoofing, its detection, and prevention / Kashaija Joel // Проблеми електромагнітної сумісності перспективних безпроводових мереж зв’язку (EМС-2022) : матеріали восьмої Міжнародної науково-технічної конференції, 24–25 листопада 2022 р. – Харків, ХНУРЕ, 2022. – С. 84-85.https://openarchive.nure.ua/handle/document/21187The work describes a simulation-based performance comparison study of a Man-on-the-Side attack based on ARP spoofing, its detection, and prevention. Using Wireshark as the deep packet analyzer, we performed a Man-on-the-Side attack leveraging the ARP spoofing table, showing the real environment created to simulate a Man-on-the-Side attack. The presented sample revealed how a MotS attack could quickly get the password from an unsecured login. The two frames from the victim and the attacker's relay to the website have been displayed.enSimulation, Man-on-the-Side attack, ARP spoofingA simulation-based performance comparison study of a man-on-the-side attack based on ARP spoofing, its detection, and preventionConference proceedings