Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker m...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Online Access: | https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF https://ir.uitm.edu.my/id/eprint/81422/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uitm.ir.81422 |
---|---|
record_format |
eprints |
spelling |
my.uitm.ir.814222023-10-02T08:09:06Z https://ir.uitm.edu.my/id/eprint/81422/ Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim Ahmad Tarmizi Lim, Siti Naquiah Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker machine launch MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking and remote hijacking against victim machines. The main motivation of this project is to gain unauthorized access and causing data breach. This project also indicate to prove that https is not really secure Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim. pp. 1-6. |
institution |
Universiti Teknologi Mara |
building |
Tun Abdul Razak Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Mara |
content_source |
UiTM Institutional Repository |
url_provider |
http://ir.uitm.edu.my/ |
language |
English |
description |
Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker machine launch MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking and remote hijacking against victim machines. The main motivation of this project is to gain unauthorized access and causing data breach. This project also indicate to prove that https is not really secure |
format |
Article |
author |
Ahmad Tarmizi Lim, Siti Naquiah |
spellingShingle |
Ahmad Tarmizi Lim, Siti Naquiah Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
author_facet |
Ahmad Tarmizi Lim, Siti Naquiah |
author_sort |
Ahmad Tarmizi Lim, Siti Naquiah |
title |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
title_short |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
title_full |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
title_fullStr |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
title_full_unstemmed |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim |
title_sort |
data breaching in cloud computing caused by man-in-the-middle (mitm) attack. / siti naquiah ahmad tarmizi lim |
url |
https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF https://ir.uitm.edu.my/id/eprint/81422/ |
_version_ |
1779442770225659904 |
score |
13.211869 |