This paper is published in Volume-4, Issue-3, 2018
Area
Information Technology
Author
Sahil Dambee, Nikhita Mangaonkar
Org/Univ
Sardar Patel Institute of Technology, Mumbai, Maharashtra, India
Pub. Date
29 June, 2018
Paper ID
V4I3-2016
Publisher
Keywords
Kali linux, MITM, Network scanners, Brute force

Citationsacebook

IEEE
Sahil Dambee, Nikhita Mangaonkar. Detecting man in the middle attack, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.

APA
Sahil Dambee, Nikhita Mangaonkar (2018). Detecting man in the middle attack. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.

MLA
Sahil Dambee, Nikhita Mangaonkar. "Detecting man in the middle attack." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.

Abstract

With Cyber-attacks and cyber-threats are increasing, network security needs to be seen in a new dimension. WLANs (Wireless Local Area Networks) are acquiring their hold in all the verticals of life. As technology is growing, a data breach at any scale, whether at the industry level or private can be menacing to distinct. Man-in-the-Middle is one of the most ruinous attacks in the WLAN. In this work, I propose a solution to detect Man-in-the-Middle attack in public or home WLANs. The objective of the work is to present a solution which allows individual to keep watch on WLAN based on data packets collected over the network and evaluating its behavior. The proposed detection system is simulated with the help of Kali Linux where the attacker is trying to get a WPA Handshake over the network, a packet sniffer tool which captures the changes over the network during the simulation and one capture analyzing tool which analyze the capture.