A Review of Man-in-the-Middle Attacks

Subodh Gangan
DOI: https://doi.org/10.48550/arXiv.1504.02115
2015-04-08
Cryptography and Security
Abstract:This paper presents a survey of man-in-the-middle (MIM) attacks in communication networks and methods of protection against them. In real time communication, the attack can in many situations be discovered by the use of timing information. The most common attacks occur due to Address Resolution Protocol (ARP) cache poisoning, DNS spoofing, session hijacking, and SSL hijacking.
What problem does this paper attempt to address?