TY - GEN
T1 - Simulating Man-in-the-Middle Attacks
T2 - 6th International Conference on Artificial Intelligence, Robotics, and Control, AIRC 2025
AU - Ajuluchukwu, Melvin
AU - Wimmer, Hayden
AU - Mohamed, Atef
N1 - Publisher Copyright:
© 2025 IEEE.
PY - 2025/5/7
Y1 - 2025/5/7
N2 - In today's world, the Man-in-the-Middle Attack (MITM) has become a significant threat to critical networks and communication systems. It is a process whereby an attacker gains unauthorized access to the privacy and integrity of data by eavesdropping on a conversation between two users who have not given consent. As this online hazard continues to unfold, it is essential to develop a method for detecting, identifying, and mitigating MITM incidents to safeguard confidential data and ensure the reliability of network systems. The purpose of this research is to simulate Man-in-the-Middle (MitM) attacks using Address Resolution Protocol (ARP) poisoning and Domain Name System (DNS) spoofing to disrupt communication between two identified parties in a monitored environment. ARP poisoning is a MITM technique used to transmit fabricated messages across local area networks (LANs) to enable changes or include fraudulent data, thereby compromising internet activities. Additionally, DNS spoofing is a technique used to divert information from a trusted website to an untrustworthy one by installing malware to monitor sensitive data. Additionally, the desired outcomes are centered on observing how these attacks are carried out, and to evaluate mitigation approaches like Hypertext Transfer Protocol Secure (HTTPS) and Virtual Private Network (VPN) for data encryption to mask Internet Protocol address (IP) for a secure network connection, to prevent these attacks, as well as contributing to the expansion and safety of a better network security environment.
AB - In today's world, the Man-in-the-Middle Attack (MITM) has become a significant threat to critical networks and communication systems. It is a process whereby an attacker gains unauthorized access to the privacy and integrity of data by eavesdropping on a conversation between two users who have not given consent. As this online hazard continues to unfold, it is essential to develop a method for detecting, identifying, and mitigating MITM incidents to safeguard confidential data and ensure the reliability of network systems. The purpose of this research is to simulate Man-in-the-Middle (MitM) attacks using Address Resolution Protocol (ARP) poisoning and Domain Name System (DNS) spoofing to disrupt communication between two identified parties in a monitored environment. ARP poisoning is a MITM technique used to transmit fabricated messages across local area networks (LANs) to enable changes or include fraudulent data, thereby compromising internet activities. Additionally, DNS spoofing is a technique used to divert information from a trusted website to an untrustworthy one by installing malware to monitor sensitive data. Additionally, the desired outcomes are centered on observing how these attacks are carried out, and to evaluate mitigation approaches like Hypertext Transfer Protocol Secure (HTTPS) and Virtual Private Network (VPN) for data encryption to mask Internet Protocol address (IP) for a secure network connection, to prevent these attacks, as well as contributing to the expansion and safety of a better network security environment.
KW - Address Resolution Protocol (ARP)
KW - Better Cap (BCP)
KW - Domain Name System (DNS)
KW - Hypertext Transfer Protocol Secure (HTTPS)
KW - Man-in-the-Middle Attack (MITM)
KW - Virtual Private Network (VPN)
UR - https://www.scopus.com/pages/publications/105012217647
U2 - 10.1109/AIRC64931.2025.11077556
DO - 10.1109/AIRC64931.2025.11077556
M3 - Conference article
AN - SCOPUS:105012217647
SN - 9798331543488
T3 - 2025 6th International Conference on Artificial Intelligence, Robotics and Control (AIRC)
SP - 447
EP - 451
BT - 2025 6th International Conference on Artificial Intelligence, Robotics, and Control, AIRC 2025
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 7 May 2025 through 9 May 2025
ER -