A self-confirming engine for preventing man-in-the-middle attack

被引:0
|
作者
Kanamori, M [1 ]
Kobayashi, T
Yamaguchi, S
机构
[1] Nara Inst Sci & Technol, Ikoma 6300192, Japan
[2] Kansai Univ, Fac Informat, Takatsuki, Osaka 5691095, Japan
关键词
ARP; ND; address resolution; MITM attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we focus on how to correct address mapping violation, in which an attacker rewrites the address mapping table of a victim to perform a Man-in-the-Middle (MITM) attack. We propose a technique for preventing MITM attacks in which a malicious user intercepts and possibly alters the data transmitted between two hosts. MITM attack is hard for legitimate users to notice during their normal communication, because each user believes they are communicating directly. Address mapping violation can occur because of vulnerability of address resolution protocols, Address Resolution Protocol (ARP) in IPv4 and Neighbor Discovery (ND) protocol in IPv6. Accordingly, a good method to prevent MITM attack by address mapping violation is essential for both current and future communications, i.e. wireless networks with roaming users and an interconnected world. Hence, our proposal mainly aims to have high usability in future applications such as embedded devices.
引用
收藏
页码:530 / 538
页数:9
相关论文
共 50 条
  • [21] A framework for the analysis of self-confirming policies
    Battigalli, P.
    Cerreia-Vioglio, S.
    Maccheroni, F.
    Marinacci, M.
    Sargent, T.
    THEORY AND DECISION, 2022, 92 (3-4) : 455 - 512
  • [22] Self-confirming equilibrium and the Lucas critique
    Fudenberg, Drew
    Levine, David K.
    JOURNAL OF ECONOMIC THEORY, 2009, 144 (06) : 2354 - 2371
  • [23] Payoff information and self-confirming equilibrium
    Dekel, E
    Fudenberg, D
    Levine, DK
    JOURNAL OF ECONOMIC THEORY, 1999, 89 (02) : 165 - 185
  • [24] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [25] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [26] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [27] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
    Alhazmi, Shatha
    Kandel, Prashanna
    Sabovik, Jayne
    Matondo-Mvula, Nadine
    Elleithy, Khaled
    2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
  • [28] Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack
    Arnaldy, Defiana
    Perdana, Audhika Rahmat
    2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, : 188 - 192
  • [29] Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing
    Hypponen, Konstantin
    Haataja, Keijo M. J.
    2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, : 64 - 68
  • [30] A framework for the analysis of self-confirming policies
    P. Battigalli
    S. Cerreia-Vioglio
    F. Maccheroni
    M. Marinacci
    T. Sargent
    Theory and Decision, 2022, 92 : 455 - 512