Abstract
The amalgamation of information technologies and progressive wireless communication systems has profoundly impacted various facets of everyday life, encompassing communication mediums, occupational procedures, and living standards. This evolution, combined with enhanced wireless communication quality, has culminated in an exponential rise in interconnected devices, including domestic appliances, thereby birthing the Internet of Things (IoT) era. This proliferation, facilitated by cloud computing enabling remote device control, concurrently intensifies cybersecurity threats. Traditional Information and Communication Technology (ICT) architectures, characterized by a hub-and-spoke model, are inherently vulnerable to illicit access and Man-in-the-Middle (MITM) intrusions, thereby endangering information confidentiality. Leveraging Artificial Intelligence (AI) can ameliorate this scenario, enhancing threat training and detection capabilities, enabling precise and preemptive attack countermeasures. This research underscores the criticality of addressing the security implications accompanying technological advancements and implementing protective measures. Deploying AI algorithms facilitates efficient passive attack identification and alleviates network device burdens. Specifically, this study scrutinized the ramifications of an MITM attack on the system, emphasizing the detection of this elusive threat using AI. Our findings attest to AI’s efficacy in detecting MITM attacks, promising significant contributions to future cybersecurity research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Simmonds, A., Sandilands, P., van Ekert, L.: An ontology for network security attacks. In: Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. LNCS, vol. 3285, pp. 317–323. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30176-9_41
Stallings, W., Brown, L.: Computer Security Principles and Practice. Second penyunt (2012)
Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)
Boyd, B.L.: Cyber warfare: armageddon in a teacup? Army Command and General Staff College, Fort Leavenworth, KS (2009)
Toutsop, O., Harvey, P., Kornegay, K.: Monitoring and detection time optimization of man in the middle attacks using machine learning. In: 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE (2020)
Maniriho, P., et al.: Anomaly-based intrusion detection approach for IoT networks using machine learning. In: 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM). IEEE (2020)
Sowah, R.A., et al.: Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). J. Comput. Netw. Commun. 2019, 4683982 (2019)
Natarajan, J.: Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms. In: AI and Big Data’s Potential for Disruptive Innovation, pp. 291–316. IGI Global (2020)
Kiran, K.S., et al.: Building an intrusion detection system for IoT environment using machine learning techniques. Procedia Comput. Sci. 171, 2372–2379 (2020)
Kang, J.J., Fahd, K., Venkatraman, S.: Trusted time-based verification model for automatic man-in-the-middle attack detection in cybersecurity. Cryptography 2(4), 38 (2018)
Mohapatra, H., et al.: Handling of a man-in-the-middle attack in WSN through intrusion detection system. Int. J. 8(5), 1503–1510 (2020)
Sebbar, A., Karim, Z.K.I.K., Baddi, Y., Boulmalf, M., Kettani, M.-C.: MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J. Ambient Intell. Human. Comput. 11(12), 5875–5894 (2020). https://doi.org/10.1007/s12652-020-02099-4
Malik, S., Chauhan, R.: Securing the Internet of Things using machine learning: a review. In: 2020 International Conference on Convergence to Digital World-Quo Vadis (ICCDW). IEEE (2020)
Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)
Sarker, I.H., et al.: Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions, and research directions. Mob. Netw. Appl. 28, 296–312 (2023). https://doi.org/10.1007/s11036-022-01937-3
Ma, Z., Liu, Y., Wang, Z., Ge, H., Zhao, M.: A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Comput. Appl. 32(22), 16819–16831 (2020). https://doi.org/10.1007/s00521-018-3929-8
Li, Y., et al.: A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks. IEEE Trans. Intell. Transp. Syst. 22(4), 2286–2298 (2020)
Saed, M., Aljuhani, A.: Detection of man in the middle attack using machine learning. In: 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE (2022)
Annarelli, A., Nonino, F., Palombi, G.: Understanding the management of cyber resilient systems. Comput. Ind. Eng. 149 (2020). https://doi.org/10.1016/j.cie.2020.106829
Choi, J., et al.: Blockchain-based man-in-the-middle (MITM) attack detection for photovoltaic systems. In: 2021 IEEE Design Methodologies Conference (DMC). IEEE (2021)
Wlazlo, P., et al.: Man-in-the-middle attacks and defense in a power system cyber-physical testbed. arXiv preprint arXiv:2102.11455 (2021)
Lv, W., Xiong, J., Shi, J., et al.: A deep convolution generative adversarial networks based fuzzing framework for industry control protocols. J. Intell. Manuf. 32, 441–457 (2021). https://doi.org/10.1007/s10845-020-01584-z
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Taştan, A.N., Gönen, S., Barışkan, M.A., Kubat, C., Kaplan, D.Y., Pashaei, E. (2024). Detection of Man-in-the-Middle Attack Through Artificial Intelligence Algorithm. In: Şen, Z., Uygun, Ö., Erden, C. (eds) Advances in Intelligent Manufacturing and Service System Informatics. IMSS 2023. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-6062-0_41
Download citation
DOI: https://doi.org/10.1007/978-981-99-6062-0_41
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-6061-3
Online ISBN: 978-981-99-6062-0
eBook Packages: EngineeringEngineering (R0)