An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries

被引:0
|
作者
Abdelsalam, Ahmed M. [1 ]
Elkilani, Wail S. [2 ]
Amin, Khalid M. [1 ]
机构
[1] Menoufia Univ, Fac Computers & Informat, Informat Technol Dept, Menoufia, Egypt
[2] Ain Shams Univ, Fac Comp & Informat, Comp Syst Dept, Cairo, Egypt
关键词
component; layer two attacks; ARP spoofing; ARP cache poisoning; Static ARP entries;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 46 条
  • [1] The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table
    Data, Mahendra
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2018), 2018, : 206 - 210
  • [2] Learn ARP Spoofing Attack in a Game
    Xu, Jinsheng
    Yuan, Xiaohong
    Nallela, Swathi
    Hillard, Kevin
    Zhang, Jinghua
    2022 IEEE FRONTIERS IN EDUCATION CONFERENCE, FIE, 2022,
  • [3] Preventing ARP Spoofing in WLAN using SHA-512
    Agrawal, Neha
    Pradeepkumar, Bhale
    Tapaswi, Shashikala
    2013 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2013, : 143 - 147
  • [4] Analysis of ARP Spoofing Attack and Defense Strategies
    Xu, Shuxin
    Zhang, Weigang
    ASIA-PACIFIC MANAGEMENT AND ENGINEERING CONFERENCE (APME 2014), 2014, : 193 - 198
  • [5] An Interactive Visualization Tool for Teaching ARP Spoofing Attack
    Scott, Brandon
    Xu, Jinsheng
    Zhang, Jinghua
    Brown, Ariana
    Clark, Erica
    Yuan, Xiaohong
    Yu, Anna
    Williams, Kenneth
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,
  • [6] Preventing ARP Spoofing Attacks through Gratuitous Decision Packet
    Salim, Haider
    Li, Zhitang
    Tu, Hao
    Guo, Zhengbiao
    2012 11TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED COMPUTING AND APPLICATIONS TO BUSINESS, ENGINEERING & SCIENCE (DCABES), 2012, : 295 - 300
  • [7] Network security management using ARP spoofing
    Kwon, K
    Ahn, S
    Chung, JW
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2004, PT 1, 2004, 3043 : 142 - 149
  • [8] ASD: ARP Spoofing Detector Using OpenWrt
    Jeong, Yeonseon
    Kim, Hyunghoon
    Jo, Hyo Jin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [9] Monitoring ARP Attack Using Responding Time and State ARP Cache
    Wang, Zhenqi
    Zhou, Yu
    SIXTH INTERNATIONAL SYMPOSIUM ON NEURAL NETWORKS (ISNN 2009), 2009, 56 : 701 - 709
  • [10] Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
    Hao, Guo
    Tao, Guo
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03): : 131 - 134