RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks

被引:0
|
作者
Daesung Moon
Jae Dong Lee
Young-Sik Jeong
Jong Hyuk Park
机构
[1] Electronics and Telecommunications Research Institute,Network Security Research Team
[2] SeoulTech,Department of Computer Science and Engineering
[3] Dongguk University,Department of Multimedia Engineering
来源
The Journal of Supercomputing | 2016年 / 72卷
关键词
Network security; Routing trace; ARP spoofing;
D O I
暂无
中图分类号
学科分类号
摘要
The motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP poisoning. The attacker can approach the transmission data between hosts by disguising itself as a different host through an ARP spoofing attack and can isolate the host as the target of an attack from the network. In this paper, we propose a routing trace-based network security system for preventing ARP spoofing attacks. Our proposed system includes detection, protection, and recovery techniques to prevent an ARP spoofing attack in the internal network. Whether an ARP spoofing attack occurs is confirmed through the periodic monitoring of the ARP table and a routing trace. The system can prevent ARP spoofing attacks without modifications to the ARP or the addition of cryptographic measures. In addition, it provides security and efficiency by overcoming the weak points of the existing researches.
引用
收藏
页码:1740 / 1756
页数:16
相关论文
共 50 条
  • [1] RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks
    Moon, Daesung
    Lee, Jae Dong
    Jeong, Young-Sik
    Park, Jong Hyuk
    JOURNAL OF SUPERCOMPUTING, 2016, 72 (05): : 1740 - 1756
  • [2] DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
    Song, Min Su
    Lee, Jae Dong
    Jeong, Young-Sik
    Jeong, Hwa-Young
    Park, Jong Hyuk
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [3] Preventing ARP Spoofing Attacks through Gratuitous Decision Packet
    Salim, Haider
    Li, Zhitang
    Tu, Hao
    Guo, Zhengbiao
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 295 - 300
  • [4] Network security management using ARP spoofing
    Kwon, K
    Ahn, S
    Chung, JW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 142 - 149
  • [5] ADES approach to Intrusion Detection System for ARP Spoofing Attacks
    Neminath, H.
    Biswas, S.
    Roopa, S.
    Ratti, R.
    Nandi, S.
    Barbhuiya, F. A.
    Sur, A.
    Ramachandran, V.
    18TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION, 2010, : 695 - 700
  • [6] A Client/Server Based Mechanism to Prevent ARP Spoofing Attacks
    Salim, Haider
    Li, Zhitang
    Tu, Hao
    Guo, Zhengbiao
    ADVANCES IN SWARM INTELLIGENCE, ICSI 2012, PT II, 2012, 7332 : 254 - 263
  • [7] Trace-based mobile network emulation
    Noble, Brian D.
    Satyanarayanan, M.
    Nguyen, Giao T.
    Katz, Randy H.
    Computer Communication Review, 1997, 27 (04): : 51 - 61
  • [8] Trace-based adaptive help system
    Sehaba, Karim
    INTERNATIONAL JOURNAL OF TECHNOLOGIES IN HIGHER EDUCATION, 2012, 9 (03): : 55 - 70
  • [9] Preventing ARP attacks using a fuzzy-based stateful ARP cache
    Trabelsi, Zouheir
    El-Hajj, Wassim
    2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1355 - 1360
  • [10] Trace-based collaborative learning system
    Lafifi Y.
    Gouasmi N.
    Halimi K.
    Herkas W.
    Salhi N.
    Ghodbani A.
    Journal of Computing and Information Technology, 2010, 18 (03) : 207 - 219