Question

In: Computer Science

Man-in-the-middle is one of the most popular types of attack. It can be used to sniff...

Man-in-the-middle is one of the most popular types of attack. It can be used to sniff victims credentials to penetrate their system. Research the following attacks to find methods to prevent this from happening:

MAC spoofing

DNS poisoning

DNS spoofing

ICMP redirect

Solutions

Expert Solution

MAC spoofing is the process of masking ( changing ) the MAC address by a malicious party to impersonate another device. The main reason behind this is that the MAC address in not encrypted. Thus we prevent MAC spoofing we have to hide the MAC address. We can do this in any one or more of the following ways:

(1) Encryption of the MAC address

(2) MAC address Randomization : i.e. the devices are given random MAC addresses which keeps rotating among devices. Thus it will become hard to track the new MAC address each time.

(3) Generate new MAC address for each device each time it makes a connection.

DNS Cache poisoning

Is a type of attack in which currupt data is inserted into the cache database DNS name server. A malicious party sends false IP addresses (which are controlled by the attacker) for requested domain names. Now this false IP address gets cached by the real DNS server and thus makes it poisionous. We can do the following to prevent it:

(1) Rely as little as possible on trust relationships with other DNS servers.

(2) It happens due to vulnerable DNS softwares. Hence most recent versions of DNS servers should be used.

(3) Use cache poisoning prevention tools like the DNSSEC (Domain name system security extension)

DNS spoofing

In a DNS server spoofing attack , a malicious party modifies the DNS server to reroute a specific domain name to a different IP address. And the new IP address is actually a server controlled by the attacker and which contains infected files , which are used to spread viruses . We can do the following to prevent DNS spoofing:

(1) Packet filtering: Inspect packets transmitted in the network

(2) Try best to keep address resolver private and protected. It should not be open to external users.

(3) Randomizing the query ID

(4) Manage our DNS server securely by hosting them by ourself, rather than get them hosted by a service provider.

ICMP redirect

Routers use ICMP redirect messages to the host to inform it of more direct routes to the destination when they use a non-optimal or defunct route. If the attacker is able to forge these ICMP redirect packets, he can send illicit ICMP redirect message which could result in a man-in-the-middle-attack or he can alter the routing tables on the host and divert the traffic. The best way to prevent such attacks is to:

(1) Disable ICMP redirect acceptance

(2) stop or minimise sending ICMP messages.

---------------------------------------------------------------------------------------------------------------------------------------------------


Related Solutions

Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
Show with a diagram or algorithm a man-in-the-middle attack on the Simple Secret Key Distribution Protocol.
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your...
INTERNET OF THINGS (IOT) 28. Hackers have employed ‘Man in the Middle Attack (MITM)’ on your IT infrastrucutre. How would you explain (with a suitable diagram) this type of attack to your apprentice who has just started working for you?
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
How would you use a man-in-the-middle attack to capture a password? Provide a detailed description.
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link...
1. Provide a scenario depicting a man-in-the-middle attack. 2. What will always be the weakest link in any security implementation? Why? 3. Define the method and purpose of social engineering.
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate...
Problem 4 | A modied man-in-the-middle attack on Diffie-Hellman Suppose Alice and Bob wish to generate a shared cryptographic key using the Diffie-Hellman protocol. As usual, they agree on a large prime p and a primitive root g of p. Suppose also that p = mq + 1 where q is prime and m is very small (so p - 1 = mq has a large prime factor, as is generally required). Since g and p are public, it is...
One of the most common types of fertilizers used by farmers is a form of the...
One of the most common types of fertilizers used by farmers is a form of the highly soluble salt ammonium chloride (NH4Cl). At a certain farm, water runoff from fields carries dissolved ammonium chloride to a nearby pond, resulting in a dissolved concentration of NH4Cl in the pond of 5 mg/L. At the same time, ammonia gas (NH3) is being produced by cows that feed around the farmer’s pond, resulting in an atmospheric level of 500 ppb above the water...
One of the most popular types of online advertising involves buying an ad-link on search engines...
One of the most popular types of online advertising involves buying an ad-link on search engines like Google, Yahoo, or Bing. Advertisers can narrowly target potential customers by buying an ad that will be placed next to the search results for a specific term. For instance, if you used Yahoo search engine and typed in “spaghetti,” you would get 13 million results, ranging from spaghetti recipes, to encyclopedia references, to a link for the “Church of the Flying Spaghetti Monster.”...
Why Programmatic direct is the most popular method (most used) in economics?
Why Programmatic direct is the most popular method (most used) in economics?
TRAINING METHODS Find the most popular training methods  used by the organizations. (You can refer to the...
TRAINING METHODS Find the most popular training methods  used by the organizations. (You can refer to the websites of the companies and/or  the management and training consulting firms) Create a list and carefully note the features and requirements of each training method. Identify the features you think would make learning easy and fun, then contrast them with features that would make training difficult or boring. Identify the training method(s) that enabled better /more effective learning and the one(s) that hindered it.
Challenge 1: Python is one of the world’s most widely-used analytics platforms. It is more popular...
Challenge 1: Python is one of the world’s most widely-used analytics platforms. It is more popular than R generally, it runs faster than R, and its analytic capabilities are rapidly improving. You'll want to use Anaconda Python because it includes many packages of use for analytics. Download Python 3.x at https://www.anaconda.com/distribution/ and install it. Challenge 2: Spyder is an open-source, integrated development environment for data scientists to program in Python. You already installed it when you installed Anaconda's Python. On...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT