COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES
Abstract
Email communication faces an escalating threat from Man-in-the-Middle (MitM) attacks, which compromise the security and integrity of emails, leading to the risk of data breaches, financial losses, and reputational harm. Traditional email security measures, such as SSL/TLS encryption and authentication protocols (e.g., SPF, DKIM, DMARC), have become increasingly insufficient in countering these advanced MitM attacks. The growing sophistication of MitM techniques, including SSL stripping, DNS spoofing, and session hijacking. This research proposes a countermeasure to MitM attacks based on email hijacking using a try-hybrid supervised learning technique. timestamps, IP addresses, port numbers, packet sizes, and various security-related indicators. The development of the MitM attack detection technique employed a try-hybrid mitm attack detection technique, which combines the strengths of three machine learning algorithms: Random Forest, Gradient Boosting Machine (GBM), and Support Vector Machine (SVM).The results demonstrate the effectiveness of the proposed try-hybrid model, achieving an accuracy of 95.8%, surpassing Benchmark 1 (92.4%) and Benchmark 2 (90.1%). Precision improves to 94.3% compared to Benchmark 1 (91.0%) and Benchmark 2 (88.5%). Similarly, recall is enhanced to 96.5% against Benchmark 1 (89.7%) and Benchmark 2 (87.2%). The F1 score of 95.4% significantly outperforms Benchmark 1 (90.3%) and Benchmark 2 (87.8%). Moreover, the proposed model achieves a lower False Positive Rate (FPR) of 3.2% compared to Benchmark 1 (5.6%) and Benchmark 2 (6.8%).These results highlight the robustness and reliability of the try-hybrid model in enhancing email security by effectively detecting and mitigating advanced MitM attacks.
References
Ahsan, M., Nygard, K. E., Gomes, R., Chowdhury, M. M., Rifat, N., and Connolly, J. F. (2022). Cybersecurity Threats and Their Mitigation Approaches Using Machine LearningA Review. Journal of Cybersecurity and Privacy, 2, 527555. https://doi.org/10.3390/jcp2030027
Bushnell, P.T., Pana-Cryan, R., Howard, J., Quay, B., and Ray. (2023). "Measuring the benefits of occupational safety and health research with economic metrics: Insights from the National Institute for Occupational Safety and Health. "International Conference on Cybersecurity Proceedings, 78-91.
Danish J. and Umar M. (2020). Man in the Middle Aacks: Analysis, MoTIvaTIon and PrevenTIon: InternaTIonal Journal of Computer Networks and CommunicaTIons Security 8(16) 52-58 10.47277/IJCNCS/8(7)1
Jhajharia, K. and Mathur, P., (2022). " A comprehensive review on machine learning in agriculture domain" IAES International Journal of Artificial Intelligence (IJ-AI), 29(2), 245-258.
Jhajharia, K., and Mathur, P. (2022). A comprehensive review on machine learning in agriculture domain. IAES International Journal of Artificial Intelligence (IJ-AI), 11(2), 753-763. https://doi.org/10.11591/ijai.vo.1.i2.pp753-763
Karmakar R., Basu R., and Das K.,(2022). Man-In-The-Middle Aack DetecTIon Using Ensemble Learning: International Conference on Computing Communication and Networking Technologies (ICCCNT). 12(5) 35-39 https://doi.org/10.1109/ICCCNT54827.2022.9984365
Mijwil, M. M., Unogwu, O. J., Filali, Y., Bala, I., and Al-Shahwani, H. (2023). Exploring the Top Five Evolving Threats in Cybersecurity: An In-Depth Overview. Mesopotamian Journal of Cybersecurity, 2023(1), 5763. https://doi.org/10.58496/MJCS/2023/010
Mijwil, M., Omega J.U., Youssef F., Indu B., and Humam A. (2023). " Exploring the Top Five Evolving Threats in Cybersecurity: An In- Depth Overview." Journal of cyber-Security, 30(2), 189-204.
Trivikram, M. (2023). " Improving malicious email detection through novel designated deep- learning architectures utilizing entire email" International Journal of Information Security, 25(2), 210-225.
Urban, C. J., and Gates, K. M. (2021). Deep learning: A primer for psychologists. https://psycnet.apa.org/record/2021-31499-001
Zeng, Y. G. (2017). Identifying email threats using predictive analysis. IEEE Transactions on Dependable and Secure Computing, 14(6), 622-635. https://ieeexplore.ieee.org/document/8074848
Copyright (c) 2025 FUDMA JOURNAL OF SCIENCES

This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences