...
首页> 外文期刊>Communications Surveys & Tutorials, IEEE >A Survey of Man In The Middle Attacks
【24h】

A Survey of Man In The Middle Attacks

机译:中间人袭击事件调查

获取原文
获取原文并翻译 | 示例
           

摘要

The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself. In this paper, we extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among them. Finally, based on our analysis, we propose a categorisation of MITM prevention mechanisms, and we identify some possible directions for future research.
机译:中间人(MITM)攻击是计算机安全中最著名的攻击之一,它是安全专业人员最关注的问题之一。 MITM的目标是在端点之间流动的实际数据,以及数据本身的机密性和完整性。在本文中,我们同时考虑了参考模型(例如开放系统互连(OSI)模型)和两种广泛使用的特定网络技术,即关于MITM的文献,对MITM攻击的范围进行了分析和分类, GSM和UMTS。特别是,我们根据几个参数对MITM攻击进行分类,例如攻击者在网络中的位置,通信通道的性质以及模拟技术。然后,基于模拟技术分类,我们为每个MITM类提供执行步骤。我们调查了现有的对策,并讨论了其中的比较。最后,基于我们的分析,我们提出了MITM预防机制的分类,并确定了未来研究的一些可能方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号