dc.contributor.advisor | Shakil, Arif | |
dc.contributor.advisor | Hossain, Muhammad Iqbal | |
dc.contributor.author | Topu, Syed Naziur Rahman | |
dc.contributor.author | Ahmed, Saif | |
dc.date.accessioned | 2024-08-29T04:29:24Z | |
dc.date.available | 2024-08-29T04:29:24Z | |
dc.date.copyright | 2022 | |
dc.date.issued | 2022-05 | |
dc.identifier.other | ID 16201109 | |
dc.identifier.other | ID 17101530 | |
dc.identifier.uri | http://hdl.handle.net/10361/23940 | |
dc.description | This thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2022. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages no. 22-23). | |
dc.description.abstract | Internet is one of the most important parts of our daily life. Network security is
necessary to secure our internet network. For security purposes, we are developing
different protocols, methods, and techniques. Still, those are not enough to secure
the internet. Attackers are finding new loopholes to create different kinds of attacks.
Man in the Middle attack is one of them. Attackers sit between a connected line
and breach their privacy and steal their information. Many existing solutions have
practical limitations, deployment costs as well as adversaries. To overcome this
problem, we are suggesting a new program to detect the Man in the Middle attack
at the beginning of the connection establishment and also alert the user about the
attack with the attacker’s information | en_US |
dc.description.statementofresponsibility | Syed Naziur Rahman Topu | |
dc.description.statementofresponsibility | Saif Ahmed | |
dc.format.extent | 23 pages | |
dc.language.iso | en | en_US |
dc.publisher | Brac University | en_US |
dc.rights | Brac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Man in the middle | en_US |
dc.subject | ARPspoofing | en_US |
dc.subject | ARP poisoning | en_US |
dc.subject | SSL stripping | en_US |
dc.subject | MAC address | en_US |
dc.subject | Ping time | en_US |
dc.subject | SSL | en_US |
dc.subject | TLS | en_US |
dc.subject | PKA | en_US |
dc.title | Detecting man in the middle attack implementing timebased verification method | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, Brac University | |
dc.description.degree | B.Sc. in Computer Science | |