COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES

  • Manir Nasir Kebbi State University of Science and Technology Aliero
  • Danlami Gabi Kebbi State University of Science and Technology Aliero
  • Salihu Alhassan Libata Kebbi State University of Science and Technology Aliero
  • Mujtaba Haruna Federal University of Agriculture Zuru
Keywords: Email hijacking, Man-in-the-Middle attacks, Machine learning

Abstract

Email communication faces an escalating threat from Man-in-the-Middle (MitM) attacks, which compromise the security and integrity of emails, leading to the risk of data breaches, financial losses, and reputational harm. Traditional email security measures, such as SSL/TLS encryption and authentication protocols (e.g., SPF, DKIM, DMARC), have become increasingly insufficient in countering these advanced MitM attacks. The growing sophistication of MitM techniques, including SSL stripping, DNS spoofing, and session hijacking. This research proposes a countermeasure to MitM attacks based on email hijacking using a try-hybrid supervised learning technique. timestamps, IP addresses, port numbers, packet sizes, and various security-related indicators. The development of the MitM attack detection technique employed a try-hybrid mitm attack detection technique, which combines the strengths of three machine learning algorithms: Random Forest, Gradient Boosting Machine (GBM), and Support Vector Machine (SVM).The results demonstrate the effectiveness of the proposed try-hybrid model, achieving an accuracy of 95.8%, surpassing Benchmark 1 (92.4%) and Benchmark 2 (90.1%). Precision improves to 94.3% compared to Benchmark 1 (91.0%) and Benchmark 2 (88.5%). Similarly, recall is enhanced to 96.5% against Benchmark 1 (89.7%) and Benchmark 2 (87.2%). The F1 score of 95.4% significantly outperforms Benchmark 1 (90.3%) and Benchmark 2 (87.8%). Moreover, the proposed model achieves a lower False Positive Rate (FPR) of 3.2% compared to Benchmark 1 (5.6%) and Benchmark 2 (6.8%).These results highlight the robustness and reliability of the try-hybrid model in enhancing email security by effectively detecting and mitigating advanced MitM attacks.

References

Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., and Connolly, J. F. (2022). Cybersecurity Threats and Their Mitigation Approaches Using Machine LearningA Review. Journal of Cybersecurity and Privacy, 2, 527555. https://doi.org/10.3390/jcp2030027

Bushnell, P.T., Pana-Cryan, R., Howard, J., Quay, B., and Ray. (2023). "Measuring the benefits of occupational safety and health research with economic metrics: Insights from the National Institute for Occupational Safety and Health. "International Conference on Cybersecurity Proceedings, 78-91.

Danish J. and Umar M. (2020). Man in the Middle Aacks: Analysis, MoTIvaTIon and PrevenTIon: InternaTIonal Journal of Computer Networks and CommunicaTIons Security 8(16) 52-58 10.47277/IJCNCS/8(7)1

Jhajharia, K. and Mathur, P., (2022). " A comprehensive review on machine learning in agriculture domain" IAES International Journal of Artificial Intelligence (IJ-AI), 29(2), 245-258.

Jhajharia, K., and Mathur, P. (2022). A comprehensive review on machine learning in agriculture domain. IAES International Journal of Artificial Intelligence (IJ-AI), 11(2), 753-763. https://doi.org/10.11591/ijai.vo.1.i2.pp753-763

Karmakar R., Basu R., and Das K.,(2022). Man-In-The-Middle Aack DetecTIon Using Ensemble Learning: International Conference on Computing Communication and Networking Technologies (ICCCNT). 12(5) 35-39 https://doi.org/10.1109/ICCCNT54827.2022.9984365

Mijwil, M. M., Unogwu, O. J., Filali, Y., Bala, I., and Al-Shahwani, H. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of Cybersecurity, 2023(1), 5763. https://doi.org/10.58496/MJCS/2023/010

Mijwil, M., Omega J.U., Youssef F., Indu B., and Humam A. (2023). " Exploring the Top Five Evolving Threats in Cybersecurity: An In- Depth Overview." Journal of cyber-Security, 30(2), 189-204.

Trivikram, M. (2023). " Improving malicious email detection through novel designated deep- learning architectures utilizing entire email" International Journal of Information Security, 25(2), 210-225.

Urban, C. J., and Gates, K. M. (2021). Deep learning: A primer for psychologists. https://psycnet.apa.org/record/2021-31499-001

Zeng, Y. G. (2017). Identifying email threats using predictive analysis. IEEE Transactions on Dependable and Secure Computing, 14(6), 622-635. https://ieeexplore.ieee.org/document/8074848

Published
2025-02-26
How to Cite
NasirM., GabiD., LibataS. A., & HarunaM. (2025). COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES. FUDMA JOURNAL OF SCIENCES, 9(2), 66 - 74. https://doi.org/10.33003/fjs-2025-0902-3062