Local Area Network Man-In-The-Middle Detection Through Address Resolution Protocol Analysis
Keywords:
Man-In-The-Middle, Local Area Network, ARP, DetectionAbstract
This article is intended to identify existing research on Man-In-The-Middle detection methods in Local Area Networks through ARP protocol analyses performed by artificial intelligences. The research has a qualitative nature and the systematic review was used as a methodological procedure. The main results showed that 31% of the articles focus on vulnerabilities of local networks, 31% aim at ARP poisoning methods, 19% study detectable methods through a Round Trip Time analysis and 19% of the articles researched methods of automating analyses through machine learning. The contribution to theory is to establish a path for further studies to be conducted based on this article. Regarding the contribution to the practice, it is to be demonstrated that there are effective forms MITM detection
References
CHENG, C.; COLBERT, E.; LIU, H.; (2019) Experimental Study on the Detectability of Man-in-the-Middle Attacks for Cloud Applications. Washington: The Catholic University of America
FOLARIN, S.; (2019) Improved ssl/tls man-inthe-middle attack detection technique using timing analysis and other behavioral anomalies. Ireland: National College of Ireland.
GANAPATHY, A.; (2020) Virtual Dispersive Network in the Prevention of Third Party Interception: A Way of Dealing with Cyber Threat. California: ABCJAR.
GONI, O.; (2019) Implementation of local area network (lan) and build a secure lan system for atomic energy research establishment. International Associations of Professionals and Technical Teachers.
HUSSAIN, F.; INDURUWA, A.; QI, M.; (2021) Security Vulnerabilities of Popular Smart Home Appliances. United Kingdom: School of Engineering, Technology and Design Canterbury Christ Church University Canterbury.
KITCHENHAM, B. (2004). Procedures for Performing Systematic Reviews.Vol. Keele, v. 33. 1-26.
KPONYO, J.; AGYEGMAN, J.; KLOGO, G.; (2020) Detecting End-Point (EP) Man-In-The-Middle (MITM) Attack based on ARP Analysis: A Machine Learning Approach. Ghana: IJCNIS.
NASSER, H.; HUSSAIN, A.; (2022) Provably curb man-in-the-middle attack-based ARP spoofing in a local network. Iraq: Bulletin of Electrical Engineering and Informatics.
THEOPHILO, C. R.; MARTINS, G. de A. (2016). Metodologia Da Investigação Científica(3a). Atlas.