A self-confirming engine for preventing man-in-the-middle attack

被引:0
|
作者
Kanamori, M [1 ]
Kobayashi, T
Yamaguchi, S
机构
[1] Nara Inst Sci & Technol, Ikoma 6300192, Japan
[2] Kansai Univ, Fac Informat, Takatsuki, Osaka 5691095, Japan
关键词
ARP; ND; address resolution; MITM attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping violation can occur because of vulnerability of address resolution protocols, Address Resolution Protocol (ARP) in IPv4 and Neighbor Discovery (ND) protocol in IPv6. Accordingly, a good method to prevent MITM attack by address mapping violation is essential for both current and future communications, i.e. wireless networks with roaming users and an interconnected world. Hence, our proposal mainly aims to have high usability in future applications such as embedded devices.
引用
收藏
页码:530 / 538
页数:9
相关论文
共 50 条
  • [1] SELF-CONFIRMING EQUILIBRIUM
    FUDENBERG, D
    LEVINE, DK
    ECONOMETRICA, 1993, 61 (03) : 523 - 545
  • [2] Preventing Man-In-The-Middle Attack in Diffie-Hellman Key Exchange Protocol
    Khader, Aqeel Sahi
    Lai, David
    2015 22ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT), 2015, : 204 - 208
  • [3] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
  • [4] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [5] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [6] An example of peer-to-peer network surveillance systems preventing man-in-the-middle attack
    Iwata, Toyonari
    Akashi, Shigeo
    Matsuzawa, Tomofumi
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKS AND INTERNET OF THINGS, CNIOT 2024, 2024, : 650 - 654
  • [7] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [8] Strongly Consistent Self-Confirming Equilibrium
    Kamada, Yuichiro
    ECONOMETRICA, 2010, 78 (02) : 823 - 832
  • [9] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [10] Self-confirming immigration policy
    Giordani, Paolo E.
    Ruta, Michele
    OXFORD ECONOMIC PAPERS-NEW SERIES, 2016, 68 (02): : 361 - 378