What is it about?

A man-in-the-middle-attack as a protocol is subjected to an outsider inside the system, which can access, read and change secret information without keeping any tress of manipulation. This issue is intense, and most of the cryptographic systems without having decent authentication security are threatened to be hacked by the malware named ‘men-in-the-middle- attack’ (MITM/MIM).

Featured Image

Why is it important?

This paper essentially includes the view of understanding the term of ‘men-in-the-middle-attack’; the current work is mainly emphasized to accumulate related data/information in a single article so that it can be a reference to conduct research further on this topic at college/undergraduate level.

Perspectives

This paper likewise audits most cited research and survey articles on ‘man-in-the-middle-attack’ recorded on 'Google Scholar'. The motivation behind this paper is to help the readers for understanding and familiarizing the topic 'man-in-the-middle attack'.

Avijit Mallik
Rajshahi University of Engineering and Technology

Read the Original

This page is a summary of: Man-in-the-middle-attack: Understanding in simple words, International Journal of Data and Network Science, January 2019, Growing Science,
DOI: 10.5267/j.ijdns.2019.1.001.
You can read the full text:

Read

Resources

Contributors

The following have contributed to this page