METHODOLOGICAL MATRIX FOR PREVENTING MITM ATTACKS IN STRATEGIC AND CIVIL INFRASTRUCTURES

Authors

  • A. А. Shkitov 1Відкритий міжнародний університет розвитку людини «Україна»; вул. Львівська 23, м. Київ, 03115, Україна;
  • N. G. Buzoveria 2Івано-Франківський національний технічний університет нафти і газу, вул. Карпатська, 15, м. Івано-Франківськ, 76019, Україна
  • O. A. Stadnichenko 3Український інститут експертизи сортів рослин; вул. Генерала Родимцева,15, м. Київ, 03041, Україна
  • K. M. Mazhuga 3Український інститут експертизи сортів рослин; вул. Генерала Родимцева,15, м. Київ, 03041, Україна
  • T. V. Gumenyuk Івано-Франківський національний технічний університет нафти і газу, вул. Карпатська, 15, м. Івано-Франківськ, 76019, Україна

Keywords:

cyberattack, MITM attack, access point, FakeAP, SSL, WPA, SSID, MITM attack prevention.

Abstract

Abstract. Cyber ​​threats are one of the biggest modern problems for businesses, organizations, and ordinary Internet users. Every year, the frequency and complexity of cyber attacks are increasing, as confirmed by statistical data in recent years. Thus, starting in 2020, a significant surge in cybercrime has been noted, in particular through attacks on distributed information systems. A particular threat is posed by Man-in-the-Middle (MITM) attacks, which allow attackers to gain access to confidential information, both corporate systems and users' personal data. The research method is to analyze the types of MITM attacks, their methods of implementation, and the development of recommendations for preventing such threats. The study is based on analysis and description methods. The work identifies the main types of MITM attacks, describes their mechanisms of action and impact on information security. The results suggest a number of methods and recommendations for countering these attacks, covering both technical and organizational aspects. The proposed methods are aimed at ensuring a high level of protection of computer networks, in particular by using modern encryption technologies, two-factor authentication and a system for detecting anomalies in network traffic. The results of the study may be useful for security administrators, software developers and ordinary users who want to increase the security of their data, especially in the context of using a public Wi-Fi network. The practical significance of the results obtained is made possible by the possibility of using the proposed recommendations to increase the security of computer networks, reduce the risk of implementing a MITM attack and develop more effective software to ensure information security.

Downloads

Download data is not yet available.

Published

2025-03-28

How to Cite

Shkitov A. А., Buzoveria, N. G., Stadnichenko, O. A., Mazhuga, K. M., & Gumenyuk, T. V. (2025). METHODOLOGICAL MATRIX FOR PREVENTING MITM ATTACKS IN STRATEGIC AND CIVIL INFRASTRUCTURES. METHODS AND DEVICES OF QUALITY CONTROL, (2(53). Retrieved from https://mpky.nung.edu.ua/index.php/mpky/article/view/638

Issue

Section

COMPUTER TECHNOLOGIES AND SYSTEMS

Most read articles by the same author(s)