The Evaluation and Detection of “A Man In The Middle” Cyberattacks
No Thumbnail Available
“Carol I” National Defence University Publishing House
How common is a “man-in-the-middle” type of attack in the wild today and how can it be detected and prevented? What is the security impact of HTTPS interception given that more and more organizations and antivirus products intercept and inspect traffic? This paper aims to provide an answer to these questions by presenting results and conclusions of the study conducted to detect man-in-the-middle attacks on a number of popular internet websites.
TLS, certificates, HTTPS, “man-in-the-middle attack”, interception