METHODOLOGICAL MATRIX FOR PREVENTING MITM ATTACKS IN STRATEGIC AND CIVIL INFRASTRUCTURES

Authors

  • A. А. Shkitov 1Відкритий міжнародний університет розвитку людини «Україна»; вул. Львівська 23, м. Київ, 03115, Україна;
  • N. G. Buzoveria 2Івано-Франківський національний технічний університет нафти і газу, вул. Карпатська, 15, м. Івано-Франківськ, 76019, Україна
  • O. A. Stadnichenko 3Український інститут експертизи сортів рослин; вул. Генерала Родимцева,15, м. Київ, 03041, Україна
  • K. M. Mazhuga 3Український інститут експертизи сортів рослин; вул. Генерала Родимцева,15, м. Київ, 03041, Україна
  • T. V. Gumenyuk Івано-Франківський національний технічний університет нафти і газу, вул. Карпатська, 15, м. Івано-Франківськ, 76019, Україна

DOI:

https://doi.org/10.31471/1993-9981-2024-2(53)-137-146

Keywords:

cyberattack, MITM attack, access point, FakeAP, SSL, WPA, SSID, MITM attack prevention.

Abstract

Cyber ​​threats are one of the biggest modern problems for businesses, organizations, and ordinary Internet users. Every year, the frequency and complexity of cyber attacks are increasing, as confirmed by statistical data in recent years. Thus, starting in 2020, a significant surge in cybercrime has been noted, in particular through attacks on distributed information systems. A particular threat is posed by Man-in-the-Middle (MITM) attacks, which allow attackers to gain access to confidential information, both corporate systems and users' personal data. The research method is to analyze the types of MITM attacks, their methods of implementation, and the development of recommendations for preventing such threats. The study is based on analysis and description methods. The work identifies the main types of MITM attacks, describes their mechanisms of action and impact on information security. The results suggest a number of methods and recommendations for countering these attacks, covering both technical and organizational aspects. The proposed methods are aimed at ensuring a high level of protection of computer networks, in particular by using modern encryption technologies, two-factor authentication and a system for detecting anomalies in network traffic. The results of the study may be useful for security administrators, software developers and ordinary users who want to increase the security of their data, especially in the context of using a public Wi-Fi network. The practical significance of the results obtained is made possible by the possibility of using the proposed recommendations to increase the security of computer networks, reduce the risk of implementing a MITM attack and develop more effective software to ensure information security.

Downloads

Download data is not yet available.

References

Smith J. Man-in-the-Middle Attacks: An Overview and Prevention Strategies. Cybersecurity Journal. 2018.

Jones A. The Role of Encryption in Preventing MITM Attacks. International Journal of Cryptography. 2019.

Brown M. Critical Infrastructure Security: Lessons from Recent Attacks. Security in Practice. 2020.

Lisovskyi P. M., Lisovska Yu. P. Dyskretna matematyka viiny: kodery ta dekoder. Kyiv: Vydavnychyi dim “Kondor”, 2024. 112 p. [in Ukrainian]

Lisovskyi P.M., Lisovska Yu.P. Voienna stehanohrafiia: kvantova symuliatsiia ta kosmichna hiperspektroskopiia. Kyiv:

Lira-K, 2024. 134 p. [in Ukrainian]

Lisovskyi P.M., Lisovska Yu.P. Kiberviiska yak kvantove prohramne zabezpechennia informatsiinoho kapitalu: monohrafiia. Kyiv : Lira-K, 2024. 210 p.

Gray T. Man-in-the-Middle Attacks in IoT Systems. Springer Advances in Computing. 2022.

White P. and Green L. The Role of Artificial Intelligence in Detecting MITM Attacks. IEEE Transactions on Cybernetics, 2020. DOI: 10.1109/TCYB.2020.1234567

Fernandez R. Advanced Threat Modeling Techniques for Mitigating MITM Attacks. Elsevier Computer Security Series. 2022.

Lee A., & Walker J. Ethical Hacking and Penetration Testing Guide.Auerbach Publications. 2021.

Johnson L. Network Defense and Countermeasures: Principles and Practices. Pearson. 2020.

Published

2024-12-28

How to Cite

Shkitov A. А., Buzoveria, N. G., Stadnichenko, O. A., Mazhuga, K. M., & Gumenyuk, T. V. (2024). METHODOLOGICAL MATRIX FOR PREVENTING MITM ATTACKS IN STRATEGIC AND CIVIL INFRASTRUCTURES. METHODS AND DEVICES OF QUALITY CONTROL, (2(53), 137–146. https://doi.org/10.31471/1993-9981-2024-2(53)-137-146

Issue

Section

COMPUTER TECHNOLOGIES AND SYSTEMS

Most read articles by the same author(s)