Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim

Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker m...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad Tarmizi Lim, Siti Naquiah (Author)
Format: Book
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_81422
042 |a dc 
100 1 0 |a Ahmad Tarmizi Lim, Siti Naquiah  |e author 
245 0 0 |a Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim 
500 |a https://ir.uitm.edu.my/id/eprint/81422/1/81422.PDF 
520 |a Data breach is one of the biggest issue faced by organization whether in public or private sector. The main objective of this research is to simulate Man-in-the-middle (MITM) attack in cloud computing environment using Graphical Network Simulator (GNS3) and Virtual Box. Using this set-up, attacker machine launch MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking and remote hijacking against victim machines. The main motivation of this project is to gain unauthorized access and causing data breach. This project also indicate to prove that https is not really secure 
546 |a en 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/81422/ 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/81422/  |z Link Metadata