Local Area Network Man-In-The-Middle Detection Through Address Resolution Protocol Analysis

Authors

Keywords:

Man-In-The-Middle, Local Area Network, ARP, Detection

Abstract

This article is intended to identify existing research on Man-In-The-Middle detection methods in Local Area Networks through ARP protocol analyses performed by artificial intelligences. The research has a qualitative nature and the systematic review was used as a methodological procedure. The main results showed that 31% of the articles focus on vulnerabilities of local networks, 31% aim at ARP poisoning methods, 19% study detectable methods through a Round Trip Time analysis and 19% of the articles researched methods of automating analyses through machine learning. The contribution to theory is to establish a path for further studies to be conducted based on this article. Regarding the contribution to the practice, it is to be demonstrated that there are effective forms MITM detection

References

CHENG, C.; COLBERT, E.; LIU, H.; (2019) Experimental Study on the Detectability of Man-in-the-Middle Attacks for Cloud Applications. Washington: The Catholic University of America

FOLARIN, S.; (2019) Improved ssl/tls man-inthe-middle attack detection technique using timing analysis and other behavioral anomalies. Ireland: National College of Ireland.

GANAPATHY, A.; (2020) Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat. California: ABCJAR.

GONI, O.; (2019) Implementation of local area network (lan) and build a secure lan system for atomic energy research establishment. International Associations of Professionals and Technical Teachers.

HUSSAIN, F.; INDURUWA, A.; QI, M.; (2021) Security Vulnerabilities of Popular Smart Home Appliances. United Kingdom: School of Engineering, Technology and Design Canterbury Christ Church University Canterbury.

KITCHENHAM, B. (2004). Procedures for Performing Systematic Reviews.Vol. Keele, v. 33. 1-26.

KPONYO, J.; AGYEGMAN, J.; KLOGO, G.; (2020) Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach. Ghana: IJCNIS.

NASSER, H.; HUSSAIN, A.; (2022) Provably curb man-in-the-middle attack-based ARP spoofing in a local network. Iraq: Bulletin of Electrical Engineering and Informatics.

THEOPHILO, C. R.; MARTINS, G. de A. (2016). Metodologia Da Investigação Científica(3a). Atlas.

Published

2023-06-21

How to Cite

Kobayashi, F., & Glória, I. (2023). Local Area Network Man-In-The-Middle Detection Through Address Resolution Protocol Analysis. Journal of Technology & Information, 3(2). Retrieved from http://www.jtni.com.br:80/index.php/JTnI/article/view/71

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.