Cross-validation based man-in-the-middle attack protection

2.50
Hdl Handle:
http://hdl.handle.net/10547/622703
Title:
Cross-validation based man-in-the-middle attack protection
Authors:
Cui, Xiaofei
Abstract:
In recent years, computer network has widely used in almost all areas of our social life. It has been profoundly changing the way of our living. However, various network attacks have become an increasingly problem at the same time. In local area networks, Man-in-the-Middle attack, as one kind of ARP attack, is the most common attack. This research implemented a cross-validation based Man-in-the-Middle attack protection method (CVP). This approach enables a host to check whether another host that responds the initialising host with an ARP reply packet is genuine. It then allows the ARP cache table of the initialising hosts to be updated with the MAC address and IP address pairs of the genuine host and to place the MAC address of inauthentic hosts into a blacklist. This research introduced ARP and ICMP firstly, including the structure of ARP and ICMP packets, and their workflows. Secondly, this research discussed the types of ARP attacks and the existing ARP attacks protection methods, including their principles, applicable environment, advantages and disadvantages. Then, this research proposed and implemented a cross-validation based Man-in-the-Middle attack protection method. Simulations and experiments were performed to examine the effect of CVP method. The results show the effectiveness of the proposed cross-validation based method in protecting network from Man-in-the-Middle attack. Compared with the existing Man-in-the-Middle attack protection methods, CVP requires no extra devices and administration, leading to more secure local area networks and low cost. It also has made a “tabu” to attackers. That is, it places the MAC address of attackers into a blacklist. So they will be identified immediately if they try to attack the network again.
Citation:
Cui, X. (2017) 'Cross-validation based man-in-the-middle attack protection'. MSc by research thesis. University of Bedfordshire.
Publisher:
University of Bedfordshire
Issue Date:
Mar-2017
URI:
http://hdl.handle.net/10547/622703
Type:
Thesis or dissertation
Language:
en
Description:
A thesis submitted to the University of Bedfordshire, in fulfilment of the requirements for the degree of Master of Science by research
Appears in Collections:
Masters e-theses

Full metadata record

DC FieldValue Language
dc.contributor.authorCui, Xiaofeien
dc.date.accessioned2018-04-30T11:54:56Z-
dc.date.available2018-04-30T11:54:56Z-
dc.date.issued2017-03-
dc.identifier.citationCui, X. (2017) 'Cross-validation based man-in-the-middle attack protection'. MSc by research thesis. University of Bedfordshire.en
dc.identifier.urihttp://hdl.handle.net/10547/622703-
dc.descriptionA thesis submitted to the University of Bedfordshire, in fulfilment of the requirements for the degree of Master of Science by researchen
dc.description.abstractIn recent years, computer network has widely used in almost all areas of our social life. It has been profoundly changing the way of our living. However, various network attacks have become an increasingly problem at the same time. In local area networks, Man-in-the-Middle attack, as one kind of ARP attack, is the most common attack. This research implemented a cross-validation based Man-in-the-Middle attack protection method (CVP). This approach enables a host to check whether another host that responds the initialising host with an ARP reply packet is genuine. It then allows the ARP cache table of the initialising hosts to be updated with the MAC address and IP address pairs of the genuine host and to place the MAC address of inauthentic hosts into a blacklist. This research introduced ARP and ICMP firstly, including the structure of ARP and ICMP packets, and their workflows. Secondly, this research discussed the types of ARP attacks and the existing ARP attacks protection methods, including their principles, applicable environment, advantages and disadvantages. Then, this research proposed and implemented a cross-validation based Man-in-the-Middle attack protection method. Simulations and experiments were performed to examine the effect of CVP method. The results show the effectiveness of the proposed cross-validation based method in protecting network from Man-in-the-Middle attack. Compared with the existing Man-in-the-Middle attack protection methods, CVP requires no extra devices and administration, leading to more secure local area networks and low cost. It also has made a “tabu” to attackers. That is, it places the MAC address of attackers into a blacklist. So they will be identified immediately if they try to attack the network again.en
dc.language.isoenen
dc.publisherUniversity of Bedfordshireen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectMan-in-the-Middle attacken
dc.subjectlocal area networksen
dc.subjectnetwork attacksen
dc.subjectnetwork securityen
dc.subjectG420 Networks and Communicationsen
dc.titleCross-validation based man-in-the-middle attack protectionen
dc.typeThesis or dissertationen
This item is licensed under a Creative Commons License
Creative Commons
All Items in UOBREP are protected by copyright, with all rights reserved, unless otherwise indicated.