An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries

被引:0
|
作者
Abdelsalam, Ahmed M. [1 ]
Elkilani, Wail S. [2 ]
Amin, Khalid M. [1 ]
机构
[1] Menoufia Univ, Fac Computers & Informat, Informat Technol Dept, Menoufia, Egypt
[2] Ain Shams Univ, Fac Comp & Informat, Comp Syst Dept, Cairo, Egypt
关键词
component; layer two attacks; ARP spoofing; ARP cache poisoning; Static ARP entries;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 46 条
  • [21] A New Look at an Old Attack: ARP Spoofing to Create Routing Loops in Ad Hoc Networks
    Brown, J. David
    Willink, Tricia J.
    AD HOC NETWORKS, ADHOCNETS 2017, 2018, 223 : 47 - 59
  • [22] A Distributed Security Approach against ARP Cache Poisoning Attack
    Nobakht, Mehdi
    Mahmoudi, Hadi
    Rahimzadeh, Omid
    CYSSS'22: PROCEEDINGS OF THE 1ST WORKSHOP ON CYBERSECURITY AND SOCIAL SCIENCES, 2022, : 27 - 32
  • [23] Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach
    Mvah, Fabrice
    Tchendji, Vianney Kengne
    Djamegni, Clementin Tayou
    Anwar, Ahmed H.
    Tosh, Deepak K.
    Kamhoua, Charles
    COMPUTERS & SECURITY, 2024, 139
  • [24] Preventing ARP Cache Poisoning Attacks: A Proof of Concept using OpenWrt
    Ortega, Andre P.
    Marcos, Xavier E.
    Chiang, Luis D.
    Abad, Cristina L.
    2009 LATIN AMERICAN NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, 2009, : 56 - 64
  • [25] A New Approach for ARP Poisoning Attack Detection Based on Network Traffic Analysis
    Atmojo, Yohanes Priyo
    Susila, I. Made Darma
    Suradarma, Ida Bagus
    Yuningsih, Lilis
    Rini, Erma Sulistyo
    Hostiadi, Dandy Pramana
    2021 4TH INTERNATIONAL SEMINAR ON RESEARCH OF INFORMATION TECHNOLOGY AND INTELLIGENT SYSTEMS (ISRITI 2021), 2020,
  • [26] A New Detection and Prevention System for ARP Attacks Using Static Entry
    Hijazi, Sherin
    Obaidat, Mohammad S.
    IEEE SYSTEMS JOURNAL, 2019, 13 (03): : 2732 - 2738
  • [27] An Approach to Addressing ARP Spoof Using a Trusted Server
    Chen, Yu-Feng
    Qin, Hao
    2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 79 - 83
  • [28] Defense Technique against Spoofing Attacks using Reliable ARP Table in Cloud Computing Environment
    Kang, Hyo Sung
    Son, Jae Hyeok
    Hong, Choong Seon
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 592 - 595
  • [29] Design and implementation of an efficient defense mechanism against ARP spoofing attacks using AES and RSA
    Hong, Seungpyo
    Oh, Myeungjin
    Lee, Sangjun
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 254 - 260
  • [30] Enhancing security in Software-Defined Networks: An approach to efficient ARP spoofing attacks detection and mitigation
    Hnamte, Vanlalruata
    Hussain, Jamal
    TELEMATICS AND INFORMATICS REPORTS, 2024, 14