{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T19:40:08Z","timestamp":1651866008739},"reference-count":28,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4,1]]},"abstract":"<p>In this paper, we focus on attacks based on sniffing like MitM, and how to counter them from the network layer perspective. We've already developed an algorithm called pathfinder that allows us to forward segments from same packets via different paths. Doing so, we'll ensure that an attacker will not be able to get hands on the entire message being transmitted. So, in this paper, we'll start by recalling the first version of pathfinder algorithm, followed by an introduction to the newest release that allows us to handle hundreds of nodes in the same network, finally we'll put this algorithm under test by simulating a sniffing attack with Wireshark. The simulation proves, in addition to its efficiency to handle a great number of nodes, that this new way of routing will help facing a lot of attacks based on sniffing, and other type of attacks like DoS.<\/p>","DOI":"10.4018\/ijcac.2017040104","type":"journal-article","created":{"date-parts":[[2017,3,10]],"date-time":"2017-03-10T14:55:16Z","timestamp":1489157716000},"page":"41-61","source":"Crossref","is-referenced-by-count":1,"title":["Countering MitM Attacks Using Evolved PathFinder Algorithm"],"prefix":"10.4018","volume":"7","author":[{"given":"Mouhcine","family":"Chliah","sequence":"first","affiliation":[{"name":"Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco"}]},{"given":"Ghizlane","family":"Orhanou","sequence":"additional","affiliation":[{"name":"Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco"}]},{"given":"Said","family":"El Hajji","sequence":"additional","affiliation":[{"name":"Mohammed V University in Rabat, Faculty of Sciences, Rabat, Morocco"}]}],"member":"2432","reference":[{"key":"IJCAC.2017040104-0","doi-asserted-by":"publisher","DOI":"10.1090\/S0273-0979-06-01130-X"},{"key":"IJCAC.2017040104-1","doi-asserted-by":"publisher","DOI":"10.4018\/ijcac.2011040105"},{"key":"IJCAC.2017040104-2","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70026-5"},{"key":"IJCAC.2017040104-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.020"},{"key":"IJCAC.2017040104-4","doi-asserted-by":"crossref","unstructured":"Arote, P., & Arya, K. V. (2015). Detection and prevention against ARP poisoning attack using modified icmp and voting. Presented at the International Conference on Computational Intelligence and Networks (CINE), Bhubaneshwar (pp. 136\u2013141). IEEE. doi.org\/10.1109\/CINE.2015.34","DOI":"10.1109\/CINE.2015.34"},{"key":"IJCAC.2017040104-5","doi-asserted-by":"crossref","unstructured":"Belenguer, J., & Calafate, C. T. (2007). A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments (pp. 122\u2013127). Presented at the International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE \u201807), Valencia. IEEE. doi.org\/10.1109\/SECUREWARE.2007.4385321","DOI":"10.1109\/SECUREWARE.2007.4385321"},{"key":"IJCAC.2017040104-6","doi-asserted-by":"publisher","DOI":"10.1109\/ICEMIS.2016.7745298"},{"key":"IJCAC.2017040104-7","doi-asserted-by":"crossref","unstructured":"Chliah, M., Orhanou, G., & Hajji, S. E. (2014). New secure routing method & applications facing MitM attacks. Presented at the Fifth International Conference on Next Generation Networks and Services (NGNS), Casablanca (pp. 92\u201395). IEEE. doi.org\/10.1109\/NGNS.2014.6990234","DOI":"10.1109\/NGNS.2014.6990234"},{"key":"IJCAC.2017040104-8","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2016.10.1.15"},{"key":"IJCAC.2017040104-9","doi-asserted-by":"crossref","unstructured":"Clark, J., & van Oorschot, P. C. (2013). SoK: SSL and HTTPS: Revisiting Past Challenges and Evaluating Certificate Trust Model Enhancements. Presented at the IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA (pp. 511\u2013525). IEEE. doi.org\/10.1109\/SP.2013.41","DOI":"10.1109\/SP.2013.41"},{"key":"IJCAC.2017040104-10","unstructured":"Dierks, T., & Allen, C. (1999). RFC 2246: The TLS protocol."},{"key":"IJCAC.2017040104-11","doi-asserted-by":"crossref","unstructured":"Duangphasuk, S., Kungpisdan, S., & Hankla, S. (2011). Design and implementation of improved security protocols for DHCP using digital certificates (pp. 287\u2013292). Presented at the 17th IEEE International Conference on Networks, Singapore. IEEE. doi.org\/10.1109\/ICON.2011.6168490","DOI":"10.1109\/ICON.2011.6168490"},{"key":"IJCAC.2017040104-12","unstructured":"Dumka, A., Mandoria, H. L., Dumka, K., & Anand, A. (2015). MPLS VPN using IPv4 and IPv6 protocol. Presented at2nd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi (pp. 1051-1055)."},{"key":"IJCAC.2017040104-13","doi-asserted-by":"crossref","unstructured":"Feghali, A., Kilany, R., & Chamoun, M. (2015). SDN security problems and solutions analysis. Presented at the International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris. IEEE. doi.org\/10.1109\/NOTERE.2015.7293514","DOI":"10.1109\/NOTERE.2015.7293514"},{"key":"IJCAC.2017040104-14","volume":"Vol. 207","author":"C.Godsil","year":"2013","journal-title":"Algebraic graph theory"},{"key":"IJCAC.2017040104-15","unstructured":"Hoboken, N. J. (2012). Graph Theory and Applications. USA: John Wiley & Sons, Inc. doi.wiley.com\/10.1002\/9781118103746.ch3"},{"key":"IJCAC.2017040104-16","doi-asserted-by":"crossref","unstructured":"Hwang, H., Jung, G., Sohn, K., & Park, S. (2008). A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP. Presented at the International Conference on Information Science and Security (ICISS), Seoul, Korea (pp. 164\u2013170). IEEE. doi.org\/10.1109\/ICISS.2008.10","DOI":"10.1109\/ICISS.2008.10"},{"key":"IJCAC.2017040104-17","doi-asserted-by":"crossref","unstructured":"Jinhua, G., & Kejian, X. (2013). ARP spoofing detection algorithm using ICMP protocol. Presented at the International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, Italy. IEEE. doi.org\/10.1109\/ICCCI.2013.6466290","DOI":"10.1109\/ICCCI.2013.6466290"},{"key":"IJCAC.2017040104-18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2353057"},{"issue":"3","key":"IJCAC.2017040104-19","first-page":"431","article-title":"A Security Approach to Prevent ARP Poisoning and Defensive tools.","volume":"2","author":"S.Khurana","year":"2015","journal-title":"International Journal of Computer and Communication System Engineering"},{"key":"IJCAC.2017040104-20","doi-asserted-by":"crossref","unstructured":"Kosta, Y., Dalal, U. D., & Jha, R. K. (2010). Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN). Presented at the International Conference on Recent Trends in Information, Telecommunication and Computing (ITC), Kochi, Kerala (pp. 281\u2013283). IEEE. doi.org\/10.1109\/ITC.2010.75","DOI":"10.1109\/ITC.2010.75"},{"key":"IJCAC.2017040104-21","doi-asserted-by":"crossref","unstructured":"Lai, Y., Pan, Q., Liu, Z., Chen, Y., & Zhou, Z. (2014). Trust-Based Security for the Spanning Tree Protocol. Presented at the IEEE International Parallel & Distributed Processing Symposium Workshops (IPDPSW), Phoenix (pp. 1338\u20131343). IEEE. doi.org\/10.1109\/IPDPSW.2014.150","DOI":"10.1109\/IPDPSW.2014.150"},{"key":"IJCAC.2017040104-22","doi-asserted-by":"crossref","unstructured":"Nath Nayak, G., & Ghosh Samaddar, S. (2010). Different flavours of Man-In-The-Middle attack, consequences and feasible solutions. Presented at the 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu (pp. 491\u2013495). IEEE. https:\/\/doi.org\/10.1109\/ICCSIT.2010.5563900","DOI":"10.1109\/ICCSIT.2010.5563900"},{"key":"IJCAC.2017040104-23","doi-asserted-by":"crossref","unstructured":"Nikbakhsh, S., Manaf, A. B. A., Zamani, M., & Janbeglou, M. (2012). A Novel Approach for Rogue Access Point Detection on the Client-Side. Presented at the 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), Fukuoka (pp. 684\u2013687). IEEE. doi.org\/10.1109\/WAINA.2012.108","DOI":"10.1109\/WAINA.2012.108"},{"key":"IJCAC.2017040104-24","doi-asserted-by":"crossref","unstructured":"Postel, J. (1981). Internet Control Message Protocol.","DOI":"10.17487\/rfc0777"},{"key":"IJCAC.2017040104-25","doi-asserted-by":"crossref","unstructured":"Ranekar, A. P., & Patil, A. R. B. (2015). Survey of DOS defense mechanisms. Presented at the International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore. IEEE. doi.org\/10.1109\/ICIIECS.2015.7193058","DOI":"10.1109\/ICIIECS.2015.7193058"},{"key":"IJCAC.2017040104-26","doi-asserted-by":"crossref","unstructured":"Solomon, T., Zungeru, A. M., & Selvaraj, R. (2016). Network traffic monitoring in an industrial environment. Presented at the Third International Conference on Electrical, Electronics, Computer Engineering and their Applications (EECEA), Beirut (pp. 133\u2013139). IEEE. doi.org\/10.1109\/EECEA.2016.7470779","DOI":"10.1109\/EECEA.2016.7470779"},{"key":"IJCAC.2017040104-27","doi-asserted-by":"publisher","DOI":"10.1109\/ICM.2011.266"}],"container-title":["International Journal of Cloud Applications and Computing"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=179537","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T19:00:42Z","timestamp":1651863642000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCAC.2017040104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,4,1]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,4]]}},"URL":"https:\/\/doi.org\/10.4018\/ijcac.2017040104","relation":{},"ISSN":["2156-1834","2156-1826"],"issn-type":[{"value":"2156-1834","type":"print"},{"value":"2156-1826","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,4,1]]}}}