Evaluation of Campus Wi-Fi Network Security Against Man-in-the-Middle Attacks Using AI-Based Intrusion Detection Sistems
DOI:
https://doi.org/10.70062/jeci.v1i3.222Keywords:
AI-Based IDS, Detection Accuracy, Machine Learning, MITM Attacks, Real-Time MonitoringAbstract
This research focuses on the effectiveness of an AI-based Intrusion Detection System (IDS) in detecting Man-in-the-Middle (MITM) attacks within campus Wi-Fi networks. MITM attacks are a significant threat to network security, as they allow attackers to intercept and manipulate communications between users and network services. The objective of this study is to evaluate the AI-based IDS’s ability to detect MITM attacks with higher accuracy and faster detection times compared to traditional signature-based IDS. The research employs machine learning (ML) and deep learning (DL) techniques, such as Support Vector Machines (SVM), Artificial Neural Networks (ANN), and Convolutional Neural Networks (CNN), to analyze Wi-Fi traffic for MITM attack detection. The study also investigates the effectiveness of hybrid models, combining multiple AI algorithms, to improve detection rates and reduce false positives. The main findings indicate that the AI-based IDS achieved 98% accuracy, significantly outperforming traditional IDS, which only reached 85%. The AI-based system also demonstrated low false positive (1.5%) and false negative (2%) rates, with an average detection time of 0.5 seconds per packet. These results highlight the superiority of AI-based IDS in terms of detection speed, accuracy, and adaptability to evolving attack methods. The study concludes that AI-powered IDS offer a more reliable and efficient solution for protecting campus networks against MITM attacks, with recommendations for future improvements, including integrating advanced AI models and expanding the dataset.
References
[1] A. Amoordon, C. Gransart, and V. Deniau, "Characterizing Wi-Fi Man-In-the-Middle Attacks," 2020 33rd General Assembly and Scientific Symposium of the International Union of Radio Science, URSI GASS 2020, 9232270, 2020, https://doi.org/10.23919/URSIGASS49373.2020.9232270.
[2] S. Ul-Aaish, I. M. Pires, A. Godinho, P. J. Coelho, and P. K. Butt, "Client risk assessment in a network: An examination of man-in-the-middle attacks and their usage," International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 793–800, 2024, https://doi.org/10.1109/EECSI63442.2024.10776323.
[3] V. Arun and K. L. Shunmuganathan, "Session - Packet inspector mobile agent to prevent encrypted cookies and HTTP post hijacking in MANET," Journal of Engineering Science and Technology, vol. 11, no. 12, pp. 1744–1757, 2016.
[4] M. Thankappan, H. Rifà-Pous, and C. Garrigues, "Multi-channel Man-in-the-Middle Attacks Against Protected Wi-Fi Networks and Their Attack Signatures," IFIP Advances in Information and Communication Technology, vol. 670, pp. 269–285, 2023, https://doi.org/10.1007/978-3-031-39811-7_22.
[5] Z. Dong, R. Espejo, Y. Wan, and W. Zhuang, "Detecting and locating man-in-the-middle attacks in fixed wireless networks," Journal of Computing and Information Technology, vol. 23, no. 4, pp. 283–293, 2015, https://doi.org/10.2498/cit.1002530.
[6] A. Ilavendhan and M. Atchaya, "Empowering cyber defenses: Shielding against man-in-the-middle attacks with public key infrastructure (PKI)," Lecture Notes in Electrical Engineering, vol. 1196, pp. 157–175, 2024, https://doi.org/10.1007/978-981-97-7862-1_11.
[7] K. V. Rao, B. R. Akshaya, G. G. Satvik, B. Rohith, and G. C. B. Lahari, "Machine learning-based man-in-the-middle attack prediction," Proceedings of the 3rd International Conference on Applied Artificial Intelligence and Computing, ICAAIC 2024, pp. 1393–1399, 2024, https://doi.org/10.1109/ICAAIC60222.2024.10575798.
[8] M. Thankappan, H. Rifà-Pous, and C. Garrigues, "A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks," IEEE Access, vol. 12, pp. 23096–23121, 2024, https://doi.org/10.1109/ACCESS.2024.3362803.
[9] B. Pingle, A. Mairaj, and A. Y. Javaid, "Real-world man-in-the-middle (MITM) attack implementation using open-source tools for instructional use," IEEE International Conference on Electro Information Technology, pp. 192–197, 2018, https://doi.org/10.1109/EIT.2018.8500082.
[10] M. Saed and A. Aljuhani, "Detection of man in the middle attack using machine learning," Proceedings of 2022 2nd International Conference on Computing and Information Technology, ICCIT 2022, pp. 388–393, 2022, https://doi.org/10.1109/ICCIT52419.2022.9711555.
[11] S. Gong, H. Ochiai, and H. Esaki, "Scan-based self anomaly detection: Client-side mitigation of channel-based man-in-the-middle attacks against Wi-Fi," Proceedings - 2020 IEEE 44th Annual Computers, Software, and Applications Conference, COMPSAC 2020, pp. 1498–1503, 2020, https://doi.org/10.1109/COMPSAC48688.2020.00-43.
[12] K. Saketh Kumar and T. J. Nagalakshmi, "Design of intrusion detection system for wireless ad hoc network in the detection of man in the middle attack using principal component analysis classifier method comparing with ANN classifier," 14th International Conference on Mathematics, Actuarial Science, Computer Science and Statistics, MACS 2022, https://doi.org/10.1109/MACS56771.2022.10022884.
[13] S. K. Kanisetty and N. J. Thiruchitrambalam, "Design of intrusion detection system for wireless adhoc network in the detection of man in the middle attack using support vector machine classifier method comparing with ANN classifier," AIP Conference Proceedings, vol. 2655, 020111, 2023, https://doi.org/10.1063/5.0119113.
[14] F. S. De Almeida, E. F. G. Trindade, M. I. Pettersson, R. MacHado, and L. A. Pereira, Jr., "Spider-sense: Wi-Fi CSI as a sixth sense for early detection in network intrusion detection systems," Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 2437–2442, 2024, https://doi.org/10.1109/GLOBECOM52923.2024.10901597.
[15] N. Karmous et al., "Deep learning approaches for protecting IoT devices in smart homes from MitM attacks," Frontiers in Computer Science, vol. 6, 1477501, 2024, https://doi.org/10.3389/fcomp.2024.1477501.
[16] W. Villegas-Ch et al., "Intrusion detection in IoT networks using dynamic graph modeling and graph-based neural networks," IEEE Access, vol. 13, pp. 65356–65375, 2025, https://doi.org/10.1109/ACCESS.2025.3559325.
[17] R. W. Anwer et al., "Advanced intrusion detection in the industrial Internet of Things using federated learning and LSTM models," Ad Hoc Networks, vol. 178, 103991, 2025, https://doi.org/10.1016/j.adhoc.2025.103991.
[18] M. Majumder, M. K. Deb Barma, and A. Saha, "ARP spoofing detection using machine learning classifiers: An experimental study," Knowledge and Information Systems, vol. 67, no. 1, pp. 727–766, 2025, https://doi.org/10.1007/s10115-024-02219-y.
[19] S. Pingle, A. Mairaj, and A. Y. Javaid, "Real-world man-in-the-middle (MITM) attack implementation using open-source tools for instructional use," IEEE International Conference on Electro Information Technology, pp. 192–197, 2018, https://doi.org/10.1109/EIT.2018.8500082.
[20] T. Le, "A recommended framework for anomaly intrusion detection system (IDS)," Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), vol. 246, pp. 1829–1840, 2015, https://www.scopus.com/inward/record.uri?eid=2-s2.0-85018263362&partnerID=40&md5=de9aacded9381b9b4b53d6fb0bc11967.
[21] M. Agoramoorthy, A. Ali, D. Sujatha, T. F. Michael Raj, and G. Ramesh, "An analysis of signature-based components in hybrid intrusion detection systems," 2023 Intelligent Computing and Control for Engineering and Business Systems, ICCEBS 2023, https://doi.org/10.1109/ICCEBS58601.2023.10449209.
[22] L. Singh and H. Jahankhani, "An approach of applying, adapting machine learning into the IDS and IPS component to improve its effectiveness and its efficiency," in Advanced Sciences and Technologies for Security Applications, pp. 43–71, 2021, https://doi.org/10.1007/978-3-030-88040-8_2.
[23] K. Das, R. Basu, and R. Karmakar, "Man-in-the-middle attack detection using ensemble learning," 2022 13th International Conference on Computing Communication and Networking Technologies, ICCCNT 2022, https://doi.org/10.1109/ICCCNT54827.2022.9984365.
[24] H. Chavoshi, A. Salasi, P. Payam, and H. Khaloozadeh, "Man-in-the-middle attack against a network control system: Practical implementation and detection," 2023 IEEE 64th International Scientific Conference on Information Technology and Management Science of Riga Technical University, ITMS 2023 - Proceedings, https://doi.org/10.1109/ITMS59786.2023.10317671.
[25] M. Conti, N. Dragoni, and V. Lesyk, "A survey of man in the middle attacks," IEEE Communications Surveys and Tutorials, vol. 18, no. 3, pp. 2027–2051, 2016, https://doi.org/10.1109/COMST.2016.2548426.
[26] B. K. Dash, L. Nanda, A. Mallik, S. Saggu, P. Goit, and B. P. Sah Teli, "Enhancement of network security through machine learning and deep learning techniques: A real-time intrusion detection system," 3rd IEEE International Conference on Industrial Electronics: Developments and Applications, ICIDeA 2025, https://doi.org/10.1109/ICIDeA64800.2025.10963052.
[27] K. C. Mouli et al., "Network intrusion detection using ML techniques for sustainable information system," E3S Web of Conferences, vol. 430, 01064, 2023, https://doi.org/10.1051/e3sconf/202343001064.
[28] C. Zhang, D. Jia, L. Wang, W. Wang, F. Liu, and A. Yang, "Comparative research on network intrusion detection methods based on machine learning," Computers and Security, vol. 121, 102861, 2022, https://doi.org/10.1016/j.cose.2022.102861.
[29] D. Glăvan, C. Răcuciu, R. Moinescu, and S. Eftimie, "Man in the middle attack on HTTPS protocol," Scientific Bulletin of Naval Academy, vol. 23, no. 1, pp. 199–201, 2020, https://doi.org/10.21279/1454-864X-20-I1-026.
[30] S. Oluwadare and Z. Elsayed, "A survey of unsupervised learning algorithms for zero-day attacks in intrusion detection systems," Proceedings of the International Florida Artificial Intelligence Research Society Conference, FLAIRS, vol. 36, 2023, https://doi.org/10.32473/flairs.36.133182.


