Abstract:
The Man-In-The-Middle (MITM) attack is among the most well-known threats in the
field of computer cyber security, one of the major issues for security analysts. MITM
focuses on the specific data flowing between both the endpoints and the data security and
integrity of information itself. These attacks had led to a terrifying loss of data. This
project attempted to describe the specifics of MITM attacks, detection, and prevention
mechanisms. In this paper, the literature on MITM is studied extensively to analyze and
categorize the scope of MITM attacks In general, classify MITM attacks based on several
criteria, such as the position of its attacker on a network, and malicious strategies. Based
on the list of impersonation methods, include effective solutions for the prevention of
measures for every MITM classification. The implementation of how to mitigate and
detect attacks against MITM has been performed with the help of virtualization tools.
This study would help to provide a better understanding of the facts, and it will also
propose the significance of the solution to important MITM attacks that have been
described in the paper.
Description:
This thesis submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Electronics and Telecommunication Engineering of East West University, Dhaka, Bangladesh.