Detect Man-In-The-Middle Attack using ARP Analysis
- Version
- Download 41
- File Size 430.43 KB
- File Count 1
- Create Date 8 February 2026
- Last Updated 8 February 2026
Detect Man-In-The-Middle Attack using ARP Analysis
Mr. Rohan Gurav
M.sc.IT, Student, Department of Information Technology,
University of Mumbai, India.
Mr. Jayesh Shinde
Professor, Department of Information Technology,
University of Mumbai, India.
Abstract:
In the era of 20s of advanced network and communication. There were lots of devices, applications, web pages, web applications, and IoT devices that connect using some networks and communicate through some "HTTPS, HTTP, URL, UDP, FTP" via different ports. But now we have a network easily, like some SIMs and some free WIFI with 4G and 5G speed. These wifi networks are easily accessible in shops, restaurants, hotels, railway stations, airports, and even hospitals. However, non-technical people get easily hacked by the attacker.Attackers target the common person using simple tools like HETTY, BETTERCAP, PROXY.PY, BURP, and ETTERCAP. To safe use of free internet and public wifi, we will analyze some network traffic here and periodically monitor the network. Many Python-based tools exist, such as
WIRESHARK, but non-technical users may find it challenging to understand properly. Here ,we are using machine learning with Python libraries, particularly "Scapy." to identify and monitor some unwanted and unnecessary network traffic to secure device networks.
Keywords: Machine Learning, Wi-Fi, Wireless Attack, Man-in-the-Middle, MITM, Network, Traffic, Package, Live Detection, Network Monitoring, Serve.
Download