作者
Mauro Conti, Nicola Dragoni, Viktor Lesyk
发表日期
2016
期刊
IEEE Communications Surveys & Tutorials
出版商
IEEE
简介
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among …
引用总数
201620172018201920202021202220232024841608110712510213456
学术搜索中的文章
M Conti, N Dragoni, V Lesyk - IEEE communications surveys & tutorials, 2016