Al-Nahrain Journal for Engineering Sciences
Login
NJES
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Submission Resources
    • Authorship
    • Article Processing Charges (APC)
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • Policies
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Copyright Policy
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Abstracting and Indexing
    • Announcements
    • Contact

Search Results for man-in-the-middle-attack

Article
Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking

Nahla Ibraheem Jabbar

Pages: 330-335

PDF Full Text
Abstract

The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat to the devices. A uniqueness of an attack that appears in multiple identities for legitimate agencies. It is very necessary to know the behavior attack and predict the possible actions of an attacker. In this research a detection of Man in the Middle attack by monitoring the Wireshark program and recording any changes can be recognized in packet information. The classification of packets is divided into two categories (normal and abnormal). The proposed model is designed in many stages: loading data, processing data, training data, and testing data. The detection of SVM based on abnormal network packet through movement packets in the Wireshark program that needs to deal with current packets to recognize a new attack that one does not have prior knowledge of its detection, and there is a need for an intelligent way to separate network packets that represent normal. The proposed approach achieved an accuracy of 97.34% in detecting attacks. The results show that the proposed model effectively visualizes attacker behavior from data that represents abnormal network attackers. Research achieves successful accuracy in predicting abnormalities.

1 - 1 of 1 items

Search Parameters

×

The submission system is temporarily under maintenance. Please send your manuscripts to

Go to Editorial Manager
Journal Logo
Al-Nahrain Journal for Engineering Sciences (NJES)

College of Engineering, Al-Nahrain University

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY NC 4.0 Logo Licensed under CC-BY-NC-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2026 College of Engineering, Al-Nahrain University, its licensors, and contributors. All rights reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply.