z-logo
open-access-imgOpen Access
Security Analysis on Remote Authentication against Man-in-the-Middle Attack on Secure Socket Layer
Author(s) -
O. Rama Devi,
S. Parvathi Vallabhaneni,
Mohammed Ali Hussain,
Tulisetti Kranthi Kumar
Publication year - 2020
Publication title -
iop conference series. materials science and engineering
Language(s) - English
Resource type - Journals
eISSN - 1757-899X
pISSN - 1757-8981
DOI - 10.1088/1757-899x/981/2/022015
Subject(s) - man in the middle attack , computer security , phishing , certificate , computer science , authorization , authentication (law) , principal (computer security) , transport layer security , internet privacy , world wide web , encryption , the internet , algorithm
One of the biggest SSL assaults is Man-In-The-Middle. ARP poisoning and phishing are some of the principal attacks against SSL. Phishing offends the user by using false certificates or fake websites to steal certificate information. As for ARP poisoning, the attacker may act as a representative on the client/server communication channel. The MITM attack makes it difficult for users to know if they have linked to an original secured link or not. Since the certificate issued during the connection setup is not secure, an intruder can alter the details in the certificate and grant user authorization. Because a number of cliens have not been well trained above the whereabouts and their attacks, they can recognize the certificates that allow attackers to perform the attack. They can also acknowledge the attack. Two techniques have been suggested in order to cope with such assaults: first for ARP poisoning and secondly for phishing.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here