Skip to main content

Detection of Man-in-the-Middle Attack Through Artificial Intelligence Algorithm

  • Conference paper
  • First Online:
Advances in Intelligent Manufacturing and Service System Informatics (IMSS 2023)

Abstract

The amalgamation of information technologies and progressive wireless communication systems has profoundly impacted various facets of everyday life, encompassing communication mediums, occupational procedures, and living standards. This evolution, combined with enhanced wireless communication quality, has culminated in an exponential rise in interconnected devices, including domestic appliances, thereby birthing the Internet of Things (IoT) era. This proliferation, facilitated by cloud computing enabling remote device control, concurrently intensifies cybersecurity threats. Traditional Information and Communication Technology (ICT) architectures, characterized by a hub-and-spoke model, are inherently vulnerable to illicit access and Man-in-the-Middle (MITM) intrusions, thereby endangering information confidentiality. Leveraging Artificial Intelligence (AI) can ameliorate this scenario, enhancing threat training and detection capabilities, enabling precise and preemptive attack countermeasures. This research underscores the criticality of addressing the security implications accompanying technological advancements and implementing protective measures. Deploying AI algorithms facilitates efficient passive attack identification and alleviates network device burdens. Specifically, this study scrutinized the ramifications of an MITM attack on the system, emphasizing the detection of this elusive threat using AI. Our findings attest to AI’s efficacy in detecting MITM attacks, promising significant contributions to future cybersecurity research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Simmonds, A., Sandilands, P., van Ekert, L.: An ontology for network security attacks. In: Manandhar, S., Austin, J., Desai, U., Oyanagi, Y., Talukder, A.K. (eds.) AACC 2004. LNCS, vol. 3285, pp. 317–323. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30176-9_41

    Chapter  Google Scholar 

  2. Stallings, W., Brown, L.: Computer Security Principles and Practice. Second penyunt (2012)

    Google Scholar 

  3. Von Solms, R., Van Niekerk, J.: From information security to cyber security. Comput. Secur. 38, 97–102 (2013)

    Article  Google Scholar 

  4. Boyd, B.L.: Cyber warfare: armageddon in a teacup? Army Command and General Staff College, Fort Leavenworth, KS (2009)

    Google Scholar 

  5. Toutsop, O., Harvey, P., Kornegay, K.: Monitoring and detection time optimization of man in the middle attacks using machine learning. In: 2020 IEEE Applied Imagery Pattern Recognition Workshop (AIPR). IEEE (2020)

    Google Scholar 

  6. Maniriho, P., et al.: Anomaly-based intrusion detection approach for IoT networks using machine learning. In: 2020 International Conference on Computer Engineering, Network, and Intelligent Multimedia (CENIM). IEEE (2020)

    Google Scholar 

  7. Sowah, R.A., et al.: Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN). J. Comput. Netw. Commun. 2019, 4683982 (2019)

    Google Scholar 

  8. Natarajan, J.: Cyber secure man-in-the-middle attack intrusion detection using machine learning algorithms. In: AI and Big Data’s Potential for Disruptive Innovation, pp. 291–316. IGI Global (2020)

    Google Scholar 

  9. Kiran, K.S., et al.: Building an intrusion detection system for IoT environment using machine learning techniques. Procedia Comput. Sci. 171, 2372–2379 (2020)

    Article  Google Scholar 

  10. Kang, J.J., Fahd, K., Venkatraman, S.: Trusted time-based verification model for automatic man-in-the-middle attack detection in cybersecurity. Cryptography 2(4), 38 (2018)

    Article  Google Scholar 

  11. Mohapatra, H., et al.: Handling of a man-in-the-middle attack in WSN through intrusion detection system. Int. J. 8(5), 1503–1510 (2020)

    Google Scholar 

  12. Sebbar, A., Karim, Z.K.I.K., Baddi, Y., Boulmalf, M., Kettani, M.-C.: MitM detection and defense mechanism CBNA-RF based on machine learning for large-scale SDN context. J. Ambient Intell. Human. Comput. 11(12), 5875–5894 (2020). https://doi.org/10.1007/s12652-020-02099-4

    Article  Google Scholar 

  13. Malik, S., Chauhan, R.: Securing the Internet of Things using machine learning: a review. In: 2020 International Conference on Convergence to Digital World-Quo Vadis (ICCDW). IEEE (2020)

    Google Scholar 

  14. Diro, A., Chilamkurti, N.: Leveraging LSTM networks for attack detection in fog-to-things communications. IEEE Commun. Mag. 56(9), 124–130 (2018)

    Article  Google Scholar 

  15. Sarker, I.H., et al.: Internet of Things (IoT) security intelligence: a comprehensive overview, machine learning solutions, and research directions. Mob. Netw. Appl. 28, 296–312 (2023). https://doi.org/10.1007/s11036-022-01937-3

    Article  Google Scholar 

  16. Ma, Z., Liu, Y., Wang, Z., Ge, H., Zhao, M.: A machine learning-based scheme for the security analysis of authentication and key agreement protocols. Neural Comput. Appl. 32(22), 16819–16831 (2020). https://doi.org/10.1007/s00521-018-3929-8

    Article  Google Scholar 

  17. Li, Y., et al.: A cross-layer defense scheme for edge intelligence-enabled CBTC systems against MitM attacks. IEEE Trans. Intell. Transp. Syst. 22(4), 2286–2298 (2020)

    Article  Google Scholar 

  18. Saed, M., Aljuhani, A.: Detection of man in the middle attack using machine learning. In: 2022 2nd International Conference on Computing and Information Technology (ICCIT). IEEE (2022)

    Google Scholar 

  19. Annarelli, A., Nonino, F., Palombi, G.: Understanding the management of cyber resilient systems. Comput. Ind. Eng. 149 (2020). https://doi.org/10.1016/j.cie.2020.106829

  20. Choi, J., et al.: Blockchain-based man-in-the-middle (MITM) attack detection for photovoltaic systems. In: 2021 IEEE Design Methodologies Conference (DMC). IEEE (2021)

    Google Scholar 

  21. Wlazlo, P., et al.: Man-in-the-middle attacks and defense in a power system cyber-physical testbed. arXiv preprint arXiv:2102.11455 (2021)

  22. Lv, W., Xiong, J., Shi, J., et al.: A deep convolution generative adversarial networks based fuzzing framework for industry control protocols. J. Intell. Manuf. 32, 441–457 (2021). https://doi.org/10.1007/s10845-020-01584-z

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mehmet Ali Barışkan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Taştan, A.N., Gönen, S., Barışkan, M.A., Kubat, C., Kaplan, D.Y., Pashaei, E. (2024). Detection of Man-in-the-Middle Attack Through Artificial Intelligence Algorithm. In: Şen, Z., Uygun, Ö., Erden, C. (eds) Advances in Intelligent Manufacturing and Service System Informatics. IMSS 2023. Lecture Notes in Mechanical Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-99-6062-0_41

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-6062-0_41

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-6061-3

  • Online ISBN: 978-981-99-6062-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics