You are on page 1of 4

ISSN: 2277 – 9043

International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 3, Issue 5, May 2014

Comprehensive Analysis of Man in the Middle Attack and Propose Statistical Detection
Approach

Manish Pathak1, NIkhat Raza 2


Department of Computer Science & Engineering.
Bansal Inst. of Sc. & Technology , Bhopal, India

Abstract— Smart computing, fast internet, ease of network the host/network without permission i.e. illegitimately
availability, ethic of wireless communication, advancement in entrance [1]. Modern attacks are not only break the
micro electronics and routing protocols and standards forms confidentiality even they potentially harmful for the system
another world called virtual world where real actions are or network both. Various types of the attack has been
taken place and planned. Sharing of the valuables was/are
popular in intruders community now a day like DoS, SYN
the fundamental key issues. Networking (internet or Internet)
is inherently adopting the same concept. Last few decades has Flood, Worm, botnet, buffer overflow, zero day attack and
motivated the open source development application and tools Man in the middle attack (Mitm). There are many methods
without bothering of good or bad. Availability of hacking, have been applied to detect and prevent intrusion and assure
cracking and sniffing open source tools makes impulsive to to preserve CIA (Confidentiality, Integrity and Availability)
break the confidentiality of the individuals. Humans are [1]. One of those techniques (tools) is Intrusion Detection
always want to break the integrity of the valuables of others System (IDS) or IPS (Intrusion Prevention System) or
and tries to make unavailable to the authenticate persons. combined IDPS. According to author [2], IDS has prolific to
Threat is all around there. Security analyst observed that the identify the intrusion in both mode host based and network
probability of occurring intrusive action is higher in case of
based but lacked to automatically response inner intranet
insider attack rather than outsider one. Intrusion in an art and
science of entrance into the host/network without permission
attacks viz. man in the middle attack to the intrusive
i.e. illegitimately entrance [1]. Modern attacks are not only activity. Hence author called IDS as after-the-fact
break the confidentiality even they potentially harmful for the notification [3].
system or network both. This article presents the This article presents the comprehensive analysis of the
comprehensive analysis of the menace of Man in the Middle menace of Man in the Middle Attack (Mitm), one of the
Attack (Mitm), one of the most dangerous insider types of most dangerous insider types of attack in LAN or Ethernet.
attack in LAN or Ethernet. Man in the middle attack is types Man in the middle attack is types of attack in which
of attack in which intruders sit between to communicator intruders sit between to communicator parties and fools to
parties and fools to both via sending false message to each both via sending false message to each other on behalf of
other on behalf of each other.
each other. More details of MITM has been explore in
Keywords- ARP, IDS, Man in the middle, MitM, SYN Flood. section -2. This attack has more dangerous for Ethernet due
TCP. to absence of security provision on it. Secondly it can easily
be launch by various open source tools.
I. INTRODUCTION .
Smart computing, fast internet, ease of network availability, Rest of the paper organized as follow, section 2 discusses
ethic of wireless communication, advancement in micro about Man in the middle attack and their modes to exploit it
electronics and routing protocols and standards forms section 3 focuses on related work in the field MitM attack.
another world called virtual world where real actions are Section 4 explores the brief idea about proposed solution
taken place and planned. Sharing of the valuables was/are and finally section 5 concludes the article.
the fundamental key issues. Networking (internet or II. M AN IN MIDDLE ATTACK
Internet) is inherently adopting the same concept. Last few
decades has motivated the open source development Author of [4] has depicted a new threat as a new security
application and tools without bothering of good or bad. challenge for the security analyst Man in the middle attack
Availability of hacking, cracking and sniffing open source (MitM). MitM also called specialized Ack-storm DoS
tools makes impulsive to break the confidentiality of the attacks, a modern family member of Denial of Service
individuals. Humans are always want to break the integrity (DoS) attacks abusing exquisite vulnerability in the
of the valuables of others and tries to make unavailable to conventional TCP protocol specifications. Such type of
the authenticate persons. Threat is all around there. attack exploitation has spread using a very weak MitM
Security analyst observed that the probability of occurring attacker, which can only snoop intermittently and spoof
intrusive action is higher in case of insider attack rather than packets (aWeakling in the Middle (WitM)). The attacks can
outsider one. Intrusion in an art and science of entrance into reach theoretically unlimited amplification; author has

269
All Rights Reserved © 2014 IJARCSEE
ISSN: 2277 – 9043
International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 3, Issue 5, May 2014

estimated the amplification of over 400,000 against popular infinite loop of sending ack packets back and forth
web sites before aborting our trial attack. Ack storm DoS between both parties
attacks are practical able. Indeed DoS are apparently Effects of the TCP SYN +ACK STROM ATTACK
unfolded and exploit immensely, particularly in view of When utilized by a WitM attacker, Ack-storm DoS
epidemic accessibility/availability of open wireless attacks target traffic in the reception range of the attacker’s
networks, conquering to an intruder to penetrate WitM wireless card. As such, the attack’s traffic bottleneck is the
potentially to millenary connections. Flooding attacks local Internet infrastructure. Most of the non-encrypted
conceivably initiated across the access network for instance HTTP based traffic in the local network is handled by the
proxy server or web server using blocking URL, contrary local proxy server. When the attack takes place, it overloads
sites (web), or adjacent to the Internet backbone. Despite of the proxy, making it unavailable to the general public.
all flooding can also pursuit counter to Transport Layer The attack may also target a specific web site. In order to
Security (TLS)/SSL connections same as to traditional (un- assure that the HTTP traffic to the site indeed reaches the
secured) TCP connections, but fizzles against IPSec or link- web site’s servers, and not handled by a proxy, the attacker
layer encrypted types of network connections. may target SSL-based traffic. SSL traffic is encrypted and is
Figure 1. shows the working of convention Man in the handled by the web site’s own servers, and not by any other
Middle Attack (MitM)- entity. Among the web sites that use an encrypted
connection we can find banks, Email providers and other
sites containing personal information of the connecting
client.

III. RELATED WORK


Author of [2] has analyses the effectiveness of the
IDS. ]. In support of this author has presented a survey of
[5] and [6] in which the speedier nature of worms has been
calculated like hyper virulent worms can infect all
vulnerable nodes (host) within 15 minutes, whereas [4]
observed that even small worms can disrupt the all
vulnerable servers within 30 seconds. That means the
latency between raising an alarm to initiate preventive
Fig. 1(a). Exploitation of Man in the Middle Attack Scenario
activity is a sufficient time to intrusion to vanish whole
service. Hence author concludes that, there is urgent
necessity of automated responsive functionality in the
modern security systems such IDS/IPS. Intrusion
Prevention System (IPS) has embedded with such
functionality of automated healing to the intrusion activity
to sit inline and check every packet before reaching to host.
Author has integrated both IDS’s and IPS’s technique to get
full protection of both types of attack insider or outsider. Or
this author proposed virtual inline techniques in conjunction
with IDS/IPS to secure from intrusion especially defends
against MITM. In this method author has placed one NIDS
and one NIPS. And create a virtual path (sender ARP
Fig.1(b). Exploitation of Man in the Middle Attack through ARP +NIPS+Reciever) for the force to transmitted
incoming/outgoing packet, so that packet inspection has
Stages to perform TCP ACK storm attack: been operated using NIPS. If there is any suspicious packet
According to author [4] following 3 steps are founds, NIPS has raise the alarm and automatic healing by
followed by the attacker to launch this attack- sending TCP, RST enabled packet to sender.
1. Pick up (at least) one packet from a TCP Authors method it just an idea of collaborated the existing
connection between a client and a server. intrusion detection technique by placing a virtual path
2. Generate two packets, each addressed to one party between them.
and with sender address of the other party (i.e. Per A. Hallgren and et. al. [7] has proposed a lightweight
spoofed). The packets must be inside the TCP authentication system to fight against min in the middle
windows of both sides. The packets should have attack. Author [7] has surveyed that modern internet has
content eat least one byte of data. driven in both modes insecure and secure via HTTP and
3. Send the packets to the client and the server at the HTTPS. In HTTPS confidentiality and integrity has the
same time. The connection will then enter an major concern while accessing data from internet, whereas

270
All Rights Reserved © 2014 IJARCSEE
ISSN: 2277 – 9043
International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 3, Issue 5, May 2014

HTTP does not care about this. While accessing web server 100MBPS, 1GBPS, 10GBPS) availability and ease of
data integrity is the major point to be considered. A biggest deployment among home and corporate users. Another dark
threat is the replay attack such as Man in the Middle Attack. side is the security aspect of the Ethernet such s flooding
Author has analyzed that HTTPS has not computationally (ARP), man in the middle attack etc.
suitable for thin devices such and smart phone. Due to In this article author has surveyed various threats related
heavy computation in HTTPS it greatly affects the end user to Ethernet technology like ARP spoofing, out of band,
performance. Hence author has proposed an lightweight ARP and DHCP poising, DoS (denial of service) and man in
authentication system to shield against man in the middle the middle attack. Author has depicted that MITM is hard
attack. Author method has installed on server and client using ARP but easy on STP (Spanning Tree Protocol). In
both and preserves the integrity with less computational despite of this various open source tools are available to
overhead. exploit the MITM attack such as etterpcap (wireshark), cain
Authors proposed mechanism has used the idea of Message and Abel tools (for windows).
Authentication Code (MAC) of cryptography to intact the Whereas author [4] has deeply surveyed and experiment
integrity of the data. Server GlassTube(author’s method) has about many web server and found that maximum research
generated a random MAC and append it with the message to work in latest cryptography (encipher/decipher) and its
transmitted to requested user, client GlassTube interface has technique embrace the concept of all-powerful Man In The
recalculate the MAC and compare it, if no changes that Middle (MitM) attacker standard. The MitM invader reins
means data is clear else damage (may be by the attacker the entire network traffic in the channels in underneath him,
using MITM). along with the intelligence to watch it, and capable of block
Author’s method is designed for smart phones the traffic (or packet) and customization of any chunks (or
where battery and computational constraint as compared whole message) passes from the channel. In opposed to the
normal computational device. While in other systems majority of the existing work in context of Denial of Service
HTTPS is more suitable for security because HTTPS use (DoS) attacks, examine the adversity that adequate weaker
SSL/TLS, asymmetric key for enciphering and HMAC attackers can cause, in order to focus on the most feasible
mechanism to assure confidentiality, integrity and and realistic attacks. Alike intruders only capable of to
availability (CIA) of the information. broadcast/send spoofed packets, or just have weaker
According to [8], dependences of today’s daily competence like – transmitting raw (fake) packets, or some
utility to heavy computation on the internet has create a fixed length control packet (well-formed), or even simply
huge security chaos. Author has discusses the seriousness of requesting packets such HTTP requests (e.g., puppets,
new challenge threat to the network security i.e. ARP seeLam et al., 2006 [10]). In this article author has
spoofing or it’s derive form ―Man in the Middle Attack‖, investigated the Weakling In The Middle (WitM) attacker
one of the most dangerous to spoil the integrity of the data miniature. In WitM an intruder can snoop packets while
and most common security attack. Author has surveyed two transmitting, however with serious restrictions, primarily:
well known methods of preventing ARP spoofing- snooping for one way connection together with getting
additional hardware based method and static ARP table small proportion of the information sent. These restrictions
concept. Hardware based method has some limitation not are enthused by real-world wireless snooping capacity,
easy to deploy everywhere and costly too. Whereas static particularly in context of to open wireless networks or
ARP table has good defense against ARP spoofing attack connections. The discriminatory constraint is owing to the
but main problem is efficiency degradation, secondly in verity that usually an intruder is solitary capable of snooping
moderns scenario DHCP is preferred method to reduces to communication from the base station (access point), and
manual logical to physical mapping it is more problematic the small proportion is because of the weak reception next
to use the concept of static approach. Author has used the to a remote snooper. Whereas open invitation for the
concept of agent to detect and mitigate the MITM attack intruder is due to Open wireless networks connection are
under ARP spoofing. To achieve this author has developed fashionable are becoming more and more common, even if
two types of agent Client_agent and Master_Agent. Client it’s in restaurants, malls or even as a city-wide infrastructure
agent has been deployed on the monitoring machine (where (Wong and Clement, 2007) [11].
attack will be exploited) or machines, whereas master agent Due to the modern technological advancement remote
has been deployed on other machines where attacks networks (far furlong) are no more secure. For example
detection and has been initiated by checking the ARP Attackers can make use of directional Yaagi antenna to get
routing table has been periodically monitored client agent clear or low powered signals efficiently from a remote point
and reported it same to master agent periodically. having a distance up to 12 miles just worth of no cost or
One main drawback is this to use of client agent its spending few dollars without the help of any special
deployment and installation on the each machines. hardware (see Chandra, 2009or numerous web pages [12]).
According to author [9] has talking about the Ethernet In this article author [4], has investigate the TCP SYN
security. One of the most modern LAN technology is FLOOD also termed as ―TCP ACK STRORM‖, According
Ethernet due to its attractive varying data rates (10MBPS, to author, Ack-Storm DoS Attacks’ that, by injecting (two

271
All Rights Reserved © 2014 IJARCSEE
ISSN: 2277 – 9043
International Journal of Advanced Research in Computer Science and Electronics Engineering (IJARCSEE)
Volume 3, Issue 5, May 2014

or more) packets into an existing TCP connection, cause a 5. Developing a behavioral based solution to protect
long exchange of TCP packets between a client and a server, from all such harmful attack.
terminated only by connection reset or packet losses. This
enables a WitM attacker to disrupt services to local and V. CONCLUSION
regional junctions in the Internet infrastructure, as well as to Exponential growth of computers and communication brings
individual web sites and services. The Ack-storm behavior new types of threat to the user and their information. LAN
of TCP has been mentioned before, in Joncheray (1995) and security is always major concern due to absence security
Wu et al. (2007), as a side effect of TCP hijacking attacks, provisions in Ethernet. In this article the most dangerous
and thus as something to be minimized and prevented. insider threat has been explore i.e. Man in the Middle Attack.
Article has presets a comprehensive literature survey in the
IV. PROPOSED SOLUTION field of Man in the middle Attack with their existing solution
Before presenting the proposed detection system following and their effects. Weakling MitM is another danger to snoop
the packets (or traffic) illegitimately. This article presents a
problems has been identify from base paper [4]-
novel statistical approach to detect and prevent MitM. Future
In the article [4] presented by author has contributed in
work is to make it operationable with assuring low cost and
following points-
high efficiency.
1. Author proposed the WitM attack model and
demonstrates how a WitM attacker can perform REFERENCES
DoS attacks. [1] Rathore, J.S. , Saurav, P. and Verma, B. ―AgentOuro: A Novelty
2. They present the Ack-storm DoS attacks. These are Based Intrusion Detection and Prevention System‖, IEEE, Fourth
powerful attacks, requiring low resources (low International Conference on Computational Intelligence and
Communication Networks (CICN), pp. 695-699, 2012.
probability to intercept packets from the network,
[2] Zheng Wu, Debao Xiao, Hui Xu, Xi Peng and Xin Zhuang ―Virtual
low bandwidth requirements) from the attacker and
Inline: A Technique of Combining IDS and IPS Together in Response
providing the highest amplification factor Intrusion‖, IEEE, First International Workshop on Education
measured until today. Technology and Computer Science, 2009.
3. And present Effective Amplification, a better [3] Top Layer Networks Inc., ―How to Properly Evaluate Network
Intrusion Prevention Systems (IPS)‖, http://www.toplayer.com, 200.
measure of the effectiveness of attacks compare to
[4] Raz Abramov and Amir Herzberg ―TCP Ack storm DoS attacks‖,
traditional amplification methods. Elsevier Science Direct, computers & security 33 (2013) 12-27, 2013.
4. The Ack-storm DoS attacks demonstrate an [5] N. C. Weaver, ―Warhol Worms: The Potential for Very Fast Internet
advantage of the use of IPSec over the use of Plagues‖, http://www.cs.berkeley.edu/nweaver/warhol.html, 2001.
[6] G. G. Staniford, S. and R. Jonkman, ―Flash Worms: Thirty Seconds
TLS/SSL. SSL connections are vulnerable to the
to Infect the Internet‖, http://www.silicondefense.com/flash/, 2002.
attacks, and even help the attacker target the [7] Per A. Hallgren, Daniel T. Mauritzso and Andrei Sabelfeld
servers and not the web proxy. IPSec, on the other ―GlassTube- A Lightweight Approach to Web Application Integrity‖,
hand, is immune to the attack, as it does not reveal ACM, PLAS’13, June 20, 2013, Seattle, WA, USA, 2013.
[8] Seungpyo Hong, Myeungjin Oh and Sangjun Lee ―Design and
TCP connection details to an eavesdropper
implementation of an efficient defense mechanism against ARP
attacker. spoofing attacks using AES and RSA‖, Elsevier Science Direct,
Proposed Work: Mathematical and Computer Modelling 58 (2013) 254–260, 2013.
Proposed work is closely related to the article [1], in which [9] Timo Kiravuo, Mikko S¨arel¨a, Jukka Manner ―A Survey of Ethernet
LAN Security‖, IEEE Communications Surveys & Tutorials,
author presented and evaluated the impact of the SYN flood
Accepted For Publication, 2013.
and DoS attack using IPERF tool. [10] Lam VT, Antonatos S, Akritidis P, Anagnostakis KG. Puppetnets:
This proposed work is extends following point as research misusing web browsers as a distributed attack infrastructure. In:
contribution towards network security concern- SIGSAC: 13th ACM conference on Computer and Communications
Security. ACM SIGSAC; 2006.
1. Measurement and Detection of DDoS and UDP
[11] Wong M, Clement A. Sharing wireless internet in urban
Flood attack neighbourhoods. In: Steinfield C, Pentland BT, Ackerman M,
2. Detection of DoS and SYN Flood Attack in Contractor N, editors. Communities and technologies 2007. London:
android Device network. Springer, ISBN 978-1-84628-905-7; 2007. p. 275e94.
URL:http://dx.doi.org/10.1007/978-1-84628-905-7_15; 200.
3. Measurement of WITM model in Android enabled [12] Chandra P. How to make a wifi antenna out of a Pringles
devices. can.makeuseof.com. URL:http://www.makeuseof.com/tag/how-to-
4. Trying new tools viz NMAP, ETTERPCAP and make-a-wifi-antenna-out-of-a-pringles-can-nb/; 2009.
Hashdostester or HPING3 for detecting and
attacking the scenario.

272
All Rights Reserved © 2014 IJARCSEE

You might also like