Published Date: 31-12-2015

DOI: 10.24128/IJRAER.2017.IJ89ij

Author(s) :

Rushita Acharya

Volume/Issue :
Volume 1 / Issue 1 (01-2015)
Abstract :

Now a days MITMA is very harmful for the user of internet. This paper is describe the different effect of MITMA. We also discuss about various method from prevention of MITMA. Abbreviated as MITMA, a man-in-the-middle attack is an attack where a user gets between the sender and receiver of information and sniffs any information being sent. In some cases, users may be sending unencrypted data, which means the man-in-the-middle (MITM) can obtain any unencrypted information. In other cases, a user may be able to obtain information from the attack, but have to unencrypt the information before it can be read. In the picture below is an example of how a man-in-the-middle attack works. The attacker intercepts some or all traffic coming from the computer, collects the data, and then forwards it to the destination the user was originally intending to visit

No. of Downloads :