The attacker, for which the synonym Mallory stands, attempts to bring the communication channel under his complete control in such a way that the communication partners cannot determine whether they are communicating with each other or with the attacker. The attacker has control over the traffic, can view the exchanged information and manipulate it.
Man-in-the-middle attacks can be successful if a public- key method without signed certificates is used as encryption, as is the case with HTTPS, for example. The only remedy against man-in-the-middle attacks is unique identification of the participants without revealing the identification to the attacker. This includes Dynamic ARP Inspection( DAI), whichchecks the IP addresses and MAC addresses in the ARP protocol and discards ARP data packets with invalid addresses.