Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim

Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker m...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Tarmizi Lim, Siti Naquiah
Format: Article
Language:English
Online Access:https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF
https://ir.uitm.edu.my/id/eprint/81422/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.81422
record_format eprints
spelling my.uitm.ir.814222023-10-02T08:09:06Z https://ir.uitm.edu.my/id/eprint/81422/ Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim Ahmad Tarmizi Lim, Siti Naquiah Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker machine launch MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking and remote hijacking against victim machines. The main motivation of this project is to gain unauthorized access and causing data breach. This project also indicate to prove that https is not really secure Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim. pp. 1-6.
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
description Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker machine launch MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking and remote hijacking against victim machines. The main motivation of this project is to gain unauthorized access and causing data breach. This project also indicate to prove that https is not really secure
format Article
author Ahmad Tarmizi Lim, Siti Naquiah
spellingShingle Ahmad Tarmizi Lim, Siti Naquiah
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
author_facet Ahmad Tarmizi Lim, Siti Naquiah
author_sort Ahmad Tarmizi Lim, Siti Naquiah
title Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
title_short Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
title_full Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
title_fullStr Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
title_full_unstemmed Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
title_sort data breaching in cloud computing caused by man-in-the-middle (mitm) attack. / siti naquiah ahmad tarmizi lim
url https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF
https://ir.uitm.edu.my/id/eprint/81422/
_version_ 1779442770225659904
score 13.211869