Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching

ABSTRACT

The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer security, representing one of the biggest concerns for security professionals. MITM targets the actual data that flows between endpoints, and the confidentiality and integrity of the data itself.

EXISTING SYSTEM

TODAY, almost each aspect of our life may be associated with the usage of Internet or cellular networks. For instance, we use online home banking, online entertainment and shopping, social networks, and so on. All these online services store or transfer user’s sensitive information, which represents a key target for hackers. Besides individuals, hackers target enterprises and organisations, leading to big economical loss. In this new world of “people and things always connected” by means of the Internet, it is very common to daily read about successful attacks to connected things and online services. One of the most successful attacks is known as Man-In-The- Middle (MITM), which results in gaining control over endusers’transferred data.

DISADVANTAGES

  • hackers target enterprises and organisations, leading to big economical loss.
  • It can change data.

PROPOSED SYSTEM

we extensively review the literature on MITM to analyse and categorise the scope of MITM attacks, considering both a reference model, such as the Open Systems Interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS. In particular, we classify MITM attacks based on several parameters, like location of an attacker in the network, nature of a communication channel, and impersonation techniques. Based on an impersonation techniques classification, we then provide execution steps for each MITM class. We survey existing countermeasures and discuss the comparison among them. Finally, based on our analysis, we propose a categorisation of MITM prevention mechanisms, and we identify some possible directions for future research.

ADVANTAGES

  • The Ethernet switch monitors the validity of the received ARP packet based on the trusted (IP, MAC) mapping database. However, this database is either manually managed or dynamically managed through DHCP snooping (see Section III-F). Also, this approach may not be effective, if the ARP spoofing occurs among the wireless nodes connected via the same Access Point (AP).
  • It can provide security .

MODULES

  • man-in-the-middle attack
  • spoofing-based mitm attack
  • ssl/tls mitm attack
  • bgp mitm attack
  • fbs-based mitm

SYSTEM CONFIGURATION

HARDWARE CONFIGURATION

ü  Processor - Pentium –IV

ü  Speed - 1.1 Ghz

ü  RAM - 256 MB(min)

ü  Hard Disk - 20 GB

ü  Key Board - Standard Windows Keyboard

ü  Mouse - Two or Three Button Mouse

ü  Monitor - SVGA

SOFTWARE CONFIGURATION

ü  Operating System - Windows Family

ü  Programming Language - JAVA

ü  Java Version - JDK 1.6 & above.