Techno-Economic Aspect of the Man-in-the-Middle Attacks

  • Zoran Cekerevac
  • Zdenek Dvorak
  • Ludmila Prigoda
  • Petar Cekerevac
Keywords: man-in-the-middle, IT, internet, eavesdropping, ARP poisoning, DNS spoofing, SSL hijacking, internet of things

Abstract

This paper analyzes some aspects of the man-in-the-middle (MITM) attacks. After a short introduction, which outlines the essence of this attack, there are presented used scientific methods and hypotheses. The next chapter presents technology of MITM attacks and benefits that a successful attack provides the attacker with. Some of the most significant examples of such attacks, which have a larger scale and significant impact on the broader Internet community, are presented. This part of the article ends with an analysis of possible protection against MITM attacks. Later, on the basis of available data, the analysis of MITM attack from an economic point of view is given. In Conclusion, the summary of the whole analysis is performed.

Author Biographies

Zoran Cekerevac

Faculty of Business and Law, “Union - Nikola Tesla” University in Belgrade, Serbia

Zdenek Dvorak

Faculty of Security Engineering, University of Zilina, Slovakia

Ludmila Prigoda

Faculty of Economics and Service, Maykop State Technological University, Maykop, Russia

Petar Cekerevac

Hilltop Strategic Services, Belgrade, Serbia

Published
2017-04-30
How to Cite
Cekerevac, Z., Dvorak, Z., Prigoda, L., & Cekerevac, P. (2017). Techno-Economic Aspect of the Man-in-the-Middle Attacks. Communications - Scientific Letters of the University of Zilina, 19(2), 166-172. Retrieved from http://journals.uniza.sk/index.php/communications/article/view/203
Section
Articles