Man-In-The-Middle (MITM) attack is the type of attack where attackers intrude into an existing communication between two computers and then monitor, capture, and control the communication. In Man-in-the-middle attack, an intruder assumes a legitimate users identity to gain control of the network communication. The other end of the communication path might believe it is you and keep on exchanging the data.
Man-in-the-Middle (MITM) attacks are also known as "session hijacking attacks", which means that the attacker hijacks a legitimate user's session to control the communication.
Many preventive methods are available for Man-In-The-Middle (MITM) attack and some are listed below.
• Public Key Infrastructure (PKI) technologies,
• Verifying delay in communication
• Stronger mutual authentication