Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking
ABSTRACT
The current era extensively utilizes the Internet, which uses data. Due to the apparent
open access Internet service, this data is highly vulnerable to attacks. Data privacy is
affected by Web-based attacks. This Systematic Literature Review (SLR) focuses on
two Web-based attacks: Man-In-The-Middle and session hijacking. It reviews about
30 studies from the years 2016-2023 that have been selected utilizing a proper study
selection procedure. This SLR comprises three research questions. The first describes
the overall trends in Man-In-The-Middle attacks and session hijacking studies. It
shows that 7 articles were published in 2018, and the trend is decreasing to 4 articles
by 2021. Moreover, 73% articles are published in conference venues, and India is the
top contributor in this domain. Lastly, this question elaborated that IEEE is the top
contributor as a publisher. The second addresses the sorts of attacks used by Man-In-
The- Middle attacks and session hijacking on Transmission Control Protocol /
Internet Protocol (TCP/IP). This demonstrates that Man-In-The-Middle attacks
invade all layers and session hijacking attacks on only two, that is, the application
and network layer. The third research question discusses the solutions provided by
different studies to deal with Man-In-The-Middle attacks and session hijacking. In
conclusion, this analysis highlights the need for stronger cyber security measures
against Man-in-the-Middle and session hijacking assaults in the Internet era by
revealing evolving trends, contributors, and solutions in data privacy.
EXISTING SYSTEM
There are a lot of different surveys conducted in the field of MITM and session
hijacking independently, such as a survey on the prevention of session hijacking [2]
on Secure Socket Layer / Transport Layer Protocol (SSL/TLP). Its scope is limited to
SSL/TLP. Furthermore, another survey discusses the state-of-the-art methodology of
session hijacking [10]. This only discusses session hijacking in banking systems. A
survey related to MITM attacks [11] shows the classification of attacks and the
countermeasures to deal with the attacker. Another review article is performed on
MITM in wireless and computing networks [17]. It categorizes the MITM attacks
and shows possible prevention methods.
Another survey [18] is related to Web accessibility and people with disabilities but
does not deal with the issue of security. This paper [19] does not explicitly focus on
matters like MITM attacks or session hijacking. Furthermore, another article deals
withWeb accessibility but does not deal with the security issues of session hijacking
and MITM. By analyzing [2], [10], [11], [17], [18], [19], it is extracted that no study
focuses on both session hijacking and MITM at a single platform. Table 1 shows the
research gap, which identifies a need for SLR that focuses on MITM and Session
Hijacking (MITM-SH). This SLR aims to work on a comparison and analysis of SH
and MITM collectively.
Disadvantages
1) In TCP hijacking, the attacker formulates an environment where the
communicating users cannot communicate or share data. The attacker here duplicates
the data coming from both ends and thus captures the whole network session [40].
2) The IP spoofing takes the mask of an original user by masking its IP address and
communicating over a network, therefore trying to gain access in an
unauthorized manner [24], [26], [31], [34], [35], [46].
3) In a packet sniffer, the attacker uses an interface among the users to look at the
interchanging data [47].
4) In UDP hijacking, the attacker replies to the UDP request as a legitimate user
before the server responds [48].
Proposed System
The proposed system comprises three research questions that will help identify year-
wise distribution, country-wise contribution, publication type, article publishers, the
ratio of attacks, and the proposed solution for MITM and session hijacking.We
compared Man-In-the-Middle (MITM) and Session Hijacking (SH), Web
Accessibility, and SH-MITM variables/parameters from several research studies to
manipulate data for our experiment. This quantitative study is carried out
methodically using pertinent MITM and session hijacking web assaults. Secondly,
we collected information from conference papers and publications. IEEE, ACM, and
Science Direct are the primary sources of data. Thirdly, we analyzed the primary
vulnerabilities identified in this research, which include phony server links, HTTPS
application layers, unauthorized user access, and unexplored upgraded technologies.
Advantages
SYSTEM REQUIREMENTS
Software Requirements:
Operating System - Windows XP
Coding Language - Java/J2EE(JSP,Servlet)
Front End - J2EE
Back End - MySQL