Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking

  • Abstract
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat to the devices. A uniqueness of an attack that appears in multiple identities for legitimate agencies. It is very necessary to know the behavior attack and predict the possible actions of an attacker. In this research a detection of Man in the Middle attack by monitoring the Wireshark program and recording any changes can be recognized in packet information. The classification of packets is divided into two categories (normal and abnormal). The proposed model is designed in many stages: loading data, processing data, training data, and testing data. The detection of SVM based on abnormal network packet through movement packets in the Wireshark program that needs to deal with current packets to recognize a new attack that one does not have prior knowledge of its detection, and there is a need for an intelligent way to separate network packets that represent normal. The proposed approach achieved an accuracy of 97.34% in detecting attacks. The results show that the proposed model effectively visualizes attacker behavior from data that represents abnormal network attackers. Research achieves successful accuracy in predicting abnormalities.

ReferencesShowing 10 of 19 papers
  • Open Access Icon
  • Cite Count Icon 136
  • 10.1016/s2212-5671(15)01077-1
Cyber-Attacks – Trends, Patterns and Security Countermeasures
  • Jan 1, 2015
  • Procedia Economics and Finance
  • Andreea Bendovschi

  • Open Access Icon
  • Cite Count Icon 12
  • 10.56294/dm202272
Anomaly Detection in Network Traffic using Machine Learning for Early Threat Detection
  • Dec 23, 2022
  • Data and Metadata
  • Mohammed Hussein Thwaini

  • Open Access Icon
  • Cite Count Icon 2
  • 10.1007/978-1-4842-8002-7
Wireshark Fundamentals
  • Jan 1, 2022
  • Vinit Jain

  • Cite Count Icon 41
  • 10.1109/jbhi.2022.3157592
Privacy-Preserving Multi-Class Support Vector Machine Model on Medical Diagnosis.
  • Jul 1, 2022
  • IEEE Journal of Biomedical and Health Informatics
  • Yange Chen + 5 more

  • Cite Count Icon 8
  • 10.1109/apsipa.2014.7041823
Support Vector Machine (SVM) based classifier for Khmer Printed Character-set Recognition
  • Dec 1, 2014
  • Pongsametrey Sok + 1 more

  • Open Access Icon
  • Cite Count Icon 2
  • 10.11591/eei.v12i1.4537
Distributed denial of service attack defense system-based auto machine learning algorithm
  • Feb 1, 2023
  • Bulletin of Electrical Engineering and Informatics
  • Mohammad Aljanabi + 5 more

  • Open Access Icon
  • Cite Count Icon 8
  • 10.11591/eei.v12i3.4830
Improving sentiment reviews classification performance using support vector machine-fuzzy matching algorithm
  • Jun 1, 2023
  • Bulletin of Electrical Engineering and Informatics
  • Vivine Nurcahyawati + 1 more

  • Open Access Icon
  • Cite Count Icon 50
  • 10.11591/eei.v12i2.4466
DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison
  • Apr 1, 2023
  • Bulletin of Electrical Engineering and Informatics
  • Mahmood A Al-Shareeda + 2 more

  • Open Access Icon
  • Cite Count Icon 2
  • 10.18421/tem52-04
Predicting Bidding Price in Construction using Support Vector Machine
  • May 26, 2016
  • TEM Journal
  • Silvana Petruseva + 3 more

  • Open Access Icon
  • Cite Count Icon 5
  • 10.5815/ijcnis.2022.01.05
Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks
  • Feb 8, 2021
  • International Journal of Computer Network and Information Security
  • Mimi M Cherian + 1 more

Similar Papers
  • Research Article
  • Cite Count Icon 67
  • 10.1016/j.procs.2018.10.125
A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing
  • Jan 1, 2018
  • Procedia Computer Science
  • Farouq Aliyu + 2 more

A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing

  • Conference Article
  • Cite Count Icon 19
  • 10.1109/iccit52419.2022.9711555
Detection of Man in The Middle Attack using Machine learning
  • Jan 25, 2022
  • Muhanna Saed + 1 more

Man in the middle (MITM) attacks can dramatically compromise the security of Wi-Fi network where an attacker eavesdrops and intercepts the communication medium over the wireless communication networks. This kind of attack aims to steal sensitive data such as credit card details, login accounts, and other important financial transactions. Even though that many detection techniques have been proposed to mitigate MITM attacks, however, this attack still occurs and causes tremendous damages. In this study, we propose a set of machine learning techniques to detect and identify MITM attacks on a wireless communication network. In addition, we evaluate and validate our approach based on the performance metrics, and compare the performance results with other machine learning techniques.

  • Book Chapter
  • Cite Count Icon 4
  • 10.1007/978-981-13-2372-0_22
Man in the Middle Attack on NTRU Key Exchange
  • Oct 10, 2018
  • Vijay Kumar Yadav + 2 more

A cryptographic scheme is as strong as its underlying key exchange algorithm. In this paper we explored NTRU key exchange and found that it is exposed to Man In The Middle (MITM) attack. Similar vulnerability has been found in original Diffie-Hellman key exchange and prevented using Zero Knowledge Proof (ZKP). We applied ZKP scheme to solve the lattice based NTRU key exchange MITM and found that even with ZKP, NTRU scheme is still vulnerable to MITM attacks. Implementation results confirm this vulnerability of MITM attack in NTRU key exchange algorithm with ZKP.

  • Research Article
  • 10.11591/csit.v5i2.p176-185
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means
  • Jul 1, 2024
  • Computer Science and Information Technologies
  • Sari Nuzulastri + 3 more

Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.

  • Research Article
  • 10.11591/csit.v5i2.pp176-185
Clustering man in the middle attack on chain and graph-based blockchain in internet of things network using k-means
  • Jul 1, 2024
  • Computer Science and Information Technologies
  • Sari Nuzulastri + 3 more

Network security on internet of things (IoT) devices in the IoT development process may open rooms for hackers and other problems if not properly protected, particularly in the addition of internet connectivity to computing device systems that are interrelated in transferring data automatically over the network. This study implements network detection on IoT network security resembles security systems from man in the middle (MITM) attacks on blockchains. Security systems that exist on blockchains are decentralized and have peer to peer characteristics which are categorized into several parts based on the type of architecture that suits their use cases such as blockchain chain based and graph based. This study uses the principal component analysis (PCA) to extract features from the transaction data processing on the blockchain process and produces 9 features before the k-means algorithm with the elbow technique was used for classifying the types of MITM attacks on IoT networks and comparing the types of blockchain chain-based and graph-based architectures in the form of visualizations as well. Experimental results show 97.16% of normal data and 2.84% of MITM attack data were observed.

  • Research Article
  • Cite Count Icon 1
  • 10.33292/ijarlit.v3i1.47
Securing a mobile ad hoc NETwork against the man in the middle attack
  • Apr 1, 2022
  • International Journal Artificial Intelligent and Informatics
  • Ryma Abass + 2 more

Mobile Ad hoc NETworks (MANET) are a special kind of wireless net- works where there is neither centralized authority nor pre-existing infrastructure. Hence, in such situation, authenticating nodes becomes a challenging task. This is even more true that some nodes may be tempted by spoofing other nodes identity in order to gain some rights and privileges. In such context, a protocol based on keys exchange such as Diffie-Hellman can be used. However, even such protocol is vulnerable to impersonation attack e.g. the Man in the Middle (MIM) attack. The main objective of this work is then, to evaluate the impact of a MIM attack on the context of MANET and to propose a security solution to such situation. This is done by (1) estimating the needed ratio of attackers to achieve a MIM attack in a given MANET and (2) proposing a security process based on the well known Diffie-Helman protocol.

  • Conference Article
  • Cite Count Icon 3
  • 10.1109/icices.2017.8070759
Web service registration and routing system and inter web proxy service model prevents the message alteration attacks, man-in-the middle attacks
  • Feb 1, 2017
  • S Chakaravarthi + 4 more

In this paper, an architectural framework for Web Service Security System that secures Web services effectively from message alteration attacks, Man-in-the Middle (MIM) attacks and Denial of Service (DoS) attacks has been proposed and implemented. This proposed system provides intelligent mechanisms for effective detection and preventions of message alteration attacks at message level, man-in-the middle attacks at transport level and denial of service attacks at application level. For this purpose, new approaches have been proposed for intelligent identification of the services requested by the user to the service provider. Moreover, new agents called requester agent and provider agent have been deployed for effective communication between the service requester and the service provider. An encryption mechanism and digital signature generation is incorporated to secure the Simple Object Access Protocol (SOAP) message over communication between the client and the server. The new approach proposed in this research work called Web Service Registration and Routing System and Inter Proxy Web Service that effectively prevents the message alteration attacks, Man-in-the Middle attacks and other types of attacks in order to secure Web service at message level. Also, new agents are such as requester agent and provider agent have been deployed at the client and server side respectively. These two agents are responsible for effective monitoring and controlling of various messages and attacks at the message level. In addition to this, a security token is created for each user request to verify the validity of the service provider and service requester for effective and secured communication. This system also provides a new approach for the intelligent prevention of Man-in-the Middle attack and Denial of Service attack in Web services.

  • Conference Article
  • Cite Count Icon 3
  • 10.1145/1878537.1878648
A novel algorithm to prevent man in the middle attack in LAN environment
  • Apr 11, 2010
  • Mohiuddin Ahmed + 1 more

Secure web sites usually use HTTPS connection to secure transactions such as money transactions, online payment, and e-commerce. The use of HTTPS gives a sense of protection against attacks such as man in the middle (MITM) attack. This paper analyzes HTTPS connections against MITM by simulating real MITM attacks on different HTTPS connections such as Gmail, Yahoo Mail and Bank accounts. It was found that with the use of right tools, HTTPS connections can be broken and passwords can be sniffed and viewed in plain text. To prevent MITM against HTTPS in LAN environment a novel algorithm (DepMAC-IP) is proposed and discussed in detail. DepMAC-IP is expected to secure LAN environment not only against MITM but also against other similar attacks.

  • Conference Article
  • Cite Count Icon 12
  • 10.1109/isgt-europe47291.2020.9248779
Demonstration of Man in the Middle Attack on a Feeder Power Factor Correction Unit
  • Oct 26, 2020
  • Lenos Hadjidemetriou + 6 more

Cyber security of distribution power systems is of an increasing and pressing importance due to the fast modernisation of current systems. Cyber attacks on distribution power systems may aim to operate the system inefficiently, steal private smart meter data or cause intentional false tripping of few or all feeders. In this paper, a Man in The Middle (MiTM) attack on a power factor correction unit is implemented and demonstrated to overload a distribution feeder and cause an intentional false tripping of the entire feeder causing regional blackout. Experimental implementation of the attack is carried out in a laboratory-scale setup using commercial power equipment under different loading conditions to demonstrate the effectiveness of this attack.

  • Research Article
  • Cite Count Icon 10
  • 10.21742/ijria.2013.1.1.02
Thwarting Address Resolution Protocol Poisoning using Man In The Middle Attack in WLAN
  • Dec 30, 2013
  • International Journal of Reliable Information and Assurance
  • Rajneesh Kumar + 2 more

The Address Resolution Protocol (ARP) takes the IP address and determines the corresponding MAC address through a broadcast reply mechanism. ARP poisoning can be done though a Man in the Middle (MITM) attack. In this paper, we present a trust based mechanism for addressing the problem of MITBM based ARP poisoning in a WLAN. The problem of ARP poisoning becomes acute in the wireless LAN environment due limited bandwidth, computation and memory, intermittent connectivity of nodes and the shared nature of the wireless broadcast channel. The resource constraints preclude employment of cryptographic primitives for authentication. The volatile connectivity and the possibility of continual arrival and departure from the networks makes manual configuration difficult. The proposed solution allows pairing of an IP address with multiple MAC addresses. This mapping prioritized according to an online trust mechanism. The implementation only requires the devices in the network to update their kernel with the modified ARP scheme. To determine the efficacy of the proposed method, it was implemented in FreeBSD kernel and tested for the successful prevention of MITM based ARP poisoning attack in a WLAN network.

  • Conference Article
  • Cite Count Icon 4
  • 10.1109/spw53761.2021.00060
Zero Conf Protocols and their numerous Man in the Middle (MITM) Attacks
  • May 1, 2021
  • Dhia Farrah + 1 more

Zero conf protocols date from 1999. They provide plug and play mechanisms to set up networks without having to conFigure DNS or DHCP servers. Almost every device (PCs, printers, scanners, etc.) nowadays “speaks” one of these protocols, sometimes without its owner being even aware of it. The booming IoT ecosystem, in particular, relies heavily on them. Unfortunately, these protocols offer a number of different ways to run, so called, man in the middle attacks (MITM). Some previous publications have mentioned and have taken advantage of one or another of these design flaws. In this paper, we provide a deep dive into the various issues at hand and show the extent of the problem. We consider that the growing reliance of networks on these protocols represent an underestimated and ill covered threat. We have run a number of experiments (300) to test various implementations and discuss our results. We also propose means to detect these attacks thanks to Zeek (aka Bro). We make the attack code as well as the Zeek scripts available to the research community in a format that makes replication of our results possible by researchers while not easy to use by script kiddies.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 21
  • 10.1155/2022/7386049
Exploiting Machine Learning to Detect Malicious Nodes in Intelligent Sensor-Based Systems Using Blockchain
  • Jan 18, 2022
  • Wireless Communications and Mobile Computing
  • Maimoona Bint E Sajid + 5 more

In this paper, a blockchain-based secure routing model is proposed for the Internet of Sensor Things (IoST). The blockchain is used to register the nodes and store the data packets’ transactions. Moreover, the Proof of Authority (PoA) consensus mechanism is used in the model to avoid the extra overhead incurred due to the use of Proof of Work (PoW) consensus mechanism. Furthermore, during routing of data packets, malicious nodes can exist in the IoST network, which eavesdrop the communication. Therefore, the Genetic Algorithm-based Support Vector Machine (GA-SVM) and Genetic Algorithm-based Decision Tree (GA-DT) models are proposed for malicious node detection. After the malicious node detection, the Dijkstra algorithm is used to find the optimal routing path in the network. The simulation results show the effectiveness of the proposed model. PoA is compared with PoW in terms of the transaction cost in which PoA has consumed 30% less cost than PoW. Furthermore, without Man In The Middle (MITM) attack, GA-SVM consumes 10% less energy than with MITM attack. Moreover, without any attack, GA-SVM consumes 30% less than grayhole attack and 60% less energy than mistreatment. The results of Decision Tree (DT), Support Vector Machine (SVM), GA-DT, and GA-SVM are compared in terms of accuracy and precision. The accuracy of DT, SVM, GA-DT, and GA-SVM is 88%, 93%, 96%, and 98%, respectively. The precision of DT, SVM, GA-DT, and GA-SVM is 100%, 92%, 94%, and 96%, respectively. In addition, the Dijkstra algorithm is compared with Bellman Ford algorithm. The shortest distances calculated by Dijkstra and Bellman are 8 and 11 hops long, respectively. Also, security analysis is performed to check the smart contract’s effectiveness against attacks. Moreover, we induced three attacks: grayhole attack, mistreatment attack, and MITM attack to check the resilience of our proposed system model.

  • Research Article
  • 10.55197/qjoest.v6i3.232
ENHANCING CYBERSECURITY OF SMART CITY WATER DISTRIBUTION SYSTEMS USING BLOCKCHAIN AND PBFT CONSENSUS MECHANISM
  • Sep 29, 2025
  • Quantum Journal of Engineering, Science and Technology
  • Amina Alajwary + 1 more

This paper investigates cybersecurity attack models and defense strategies for water distribution systems (WDS) in smart city environments. As water infrastructure becomes increasingly digitized, it faces sophisticated cyber threats that could compromise system integrity and operational reliability. This study presents a systematic analysis of two prevalent attack vectors Denial of Service (DoS) and Man in the Middle (MITM) attacks and evaluates blockchain based defense mechanisms against these threats. Through experimental simulation using the C-town WDS model with 953 timestamp data points, we assess the vulnerability of water systems and the effectiveness of six consensus mechanisms: Proof of Work (PoW), Proof of Trust (PoT), Proof of Authority (PoA), Proof of Vote (PoV), Proof of Authentication (PoAuth), and Practical Byzantine Fault Tolerance (PBFT). The research quantifies attack impacts and demonstrates the superior resilience of PBFT, which achieved an 82.5% defense rate against DoS attacks and an 82.7% defense rate against MITM attacks, significantly outperforming alternative approaches. Furthermore, PBFT exhibited exceptional recovery capabilities with 71.1% recovery after DoS attacks and 89.3% recovery following MITM attacks. These findings provide valuable insights for implementing robust security frameworks that can maintain water system integrity even under sophisticated attack conditions.

  • Book Chapter
  • 10.1016/b978-159749047-4/50008-9
Chapter 5 - RFID Attacks: Tag Application Attacks
  • Jan 1, 2005
  • RFID Security

Chapter 5 - RFID Attacks: Tag Application Attacks

  • Conference Article
  • Cite Count Icon 8
  • 10.1109/cicn.2012.72
Contention for Man-in-the-Middle Attacks in Bluetooth Networks
  • Nov 1, 2012
  • S Sandhya + 1 more

The adoption rate of Bluetooth technology has been very fast. It is estimated that there will be around 1 billion users who will be using some Bluetooth devices one way or the other. The fast adoption rate has made the manufacturers and users to work on delivering products based on the latest version of Bluetooth which is v4.0. One of the major attacks on Bluetooth is the Man in the middle attack. This paper reviews the existing literature on various man in the middle attacks. The existing counter measures for thwarting the man in the middle attack are also discussed. We propose an additional counter measure that will help in countering the attack and making the communication more secure.

More from: Al-Nahrain Journal for Engineering Sciences
  • Research Article
  • 10.29194/njes.28030378
Using Zeolite as a Partially Replaced Cement in Construction Materials: A Systematic Review of Properties
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Alaa M Hamad + 3 more

  • Research Article
  • 10.29194/njes.28030372
Urban Spaces Efficiency Qualification in Vertical Residential Buildings: Al -Amal Residential Complex as Case Study
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Badr Alghezi + 1 more

  • Research Article
  • 10.29194/njes.28030436
Evaluation of Temperature Distribution on Human Skin During Philaser Tattoo Removal
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Zahra Amer Salman + 2 more

  • Research Article
  • 10.29194/njes.28030362
Review of the Current Advances of Silver Halides-Based Composites as Photocatalysts for the Degradation of Organic Pollutants
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Hanan H Abed + 1 more

  • Research Article
  • 10.29194/njes.28030330
Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Nahla Ibraheem Jabbar

  • Research Article
  • 10.29194/njes.28030351
Laser Generated MoS2 Nanomaterials and Its Applications: A Review
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Layal A Jasim + 2 more

  • Research Article
  • 10.29194/njes.28030403
A Review on Automated Segmentation of Lung Lesions in Chest CT Scans Using Hybrid Approaches
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Raed Hamid Lateef + 1 more

  • Research Article
  • 10.29194/njes.28030442
Utilizing Sustainable Recycled Thermoplastic Polymers in 3D Printing Filament
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Bashar Dheyaa Hussein + 1 more

  • Research Article
  • 10.29194/njes.28030392
Metabolic Cost Reduction and Analysis of Assisted Walking Gait: A Review
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Noor Abdul Kareem Shehab + 1 more

  • Research Article
  • 10.29194/njes.28030481
The Seismic Response of a Shallow Foundation Supported on Geogrid-Reinforced Sand Soil
  • Sep 29, 2025
  • Al-Nahrain Journal for Engineering Sciences
  • Ruqayah Al-Khafaji + 1 more

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon