Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim
Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauth...
Saved in:
Main Author: | |
---|---|
Format: | Thesis |
Language: | English |
Published: |
2016
|
Subjects: | |
Online Access: | https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my-uitm-ir.69022 |
---|---|
record_format |
uketd_dc |
spelling |
my-uitm-ir.690222023-03-16T02:59:02Z Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim 2016 Ahmad Tarmizi Lim, Siti Naquiah Mobile computing Intrusion detection systems (Computer security). Computer network security. Hackers Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password. 2016 Thesis https://ir.uitm.edu.my/id/eprint/69022/ https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf text en public masters Universiti Teknologi MARA (UiTM) Faculty of Electrical Engineering Yussoff, Yusnani Mohd |
institution |
Universiti Teknologi MARA |
collection |
UiTM Institutional Repository |
language |
English |
advisor |
Yussoff, Yusnani Mohd |
topic |
Mobile computing Mobile computing |
spellingShingle |
Mobile computing Mobile computing Ahmad Tarmizi Lim, Siti Naquiah Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
description |
Data breach is one of the biggest issues faced by organization whether in public or private sector. It is an incident where sensitive, protected or confidential data has been viewed, stolen or used by an unauthorized individual. Verizon Data Breach 2014 reported that 73% data breach causes by unauthorized access and stole password. Man-in-the-Middle (MITM) attack is one of the attacks that can gain unauthorized access without the user knows. It is one type of eavesdropping attack that occurs when attacker place himself between users or systems in a communication session. The main objective of this project is to conduct MITM attack, gain unauthorized access and causing data breach. This project also indicates to analyze the security of the https website. Graphical Network Simulator 3 (GNS3) and virtual box have been used to conduct this test in cloud computing environment that is connected to the real network. Using this set-up, attacker machine launched MITM attacks such as DNS Spoofing, session hijacking, SSL hijacking, database hijacking and remote hijacking against victim machines. Result gain shows that attacker able to cause data breach by gaining unauthorized access using stolen password. |
format |
Thesis |
qualification_level |
Master's degree |
author |
Ahmad Tarmizi Lim, Siti Naquiah |
author_facet |
Ahmad Tarmizi Lim, Siti Naquiah |
author_sort |
Ahmad Tarmizi Lim, Siti Naquiah |
title |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
title_short |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
title_full |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
title_fullStr |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
title_full_unstemmed |
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack / Siti Naquiah Ahmad Tarmizi Lim |
title_sort |
data breaching in cloud computing caused by man-in-the-middle (mitm) attack / siti naquiah ahmad tarmizi lim |
granting_institution |
Universiti Teknologi MARA (UiTM) |
granting_department |
Faculty of Electrical Engineering |
publishDate |
2016 |
url |
https://ir.uitm.edu.my/id/eprint/69022/1/69022.pdf |
_version_ |
1783735833724977152 |