An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries

被引:0
|
作者
Abdelsalam, Ahmed M. [1 ]
Elkilani, Wail S. [2 ]
Amin, Khalid M. [1 ]
机构
[1] Menoufia Univ, Fac Computers & Informat, Informat Technol Dept, Menoufia, Egypt
[2] Ain Shams Univ, Fac Comp & Informat, Comp Syst Dept, Cairo, Egypt
关键词
component; layer two attacks; ARP spoofing; ARP cache poisoning; Static ARP entries;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic.
引用
收藏
页码:105 / 112
页数:8
相关论文
共 46 条
  • [41] A New Approach in Automated Fingerprint Presentation Attack Detection Using Optical Coherence Tomography
    Sun, Haohao
    Zhang, Yilong
    Chen, Peng
    Wang, Haixia
    Liu, Yi-Peng
    Liang, Ronghua
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4243 - 4257
  • [42] Automated Attack Discovery in TCP Congestion Control Using a Model-guided Approach
    Jero, Samuel
    Hoque, Endadul
    Choffnes, David
    Mislove, Alan
    Nita-Rotaru, Cristina
    PROCEEDINGS OF THE 2018 APPLIED NETWORKING RESEARCH WORKSHOP (ANRW '18), 2018, : 95 - 95
  • [43] Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach
    Pattabiraman, Karthik
    Kalbarczyk, Zbigniew T.
    Iyer, Ravishankar K.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (01) : 44 - 57
  • [44] Investigation of the handling qualities of fighter aircraft with relaxed static stability at high angles of attack using a holistic simulation approach
    Evangelou, LD
    Kapadoukas, GG
    Self, AW
    INTERNATIONAL CONFERENCE ON SIMULATION '98, 1998, (457): : 58 - 68
  • [45] From Monolith to Microservices: A Semi-Automated Approach for Legacy to Modern Architecture Transition using Static Analysis
    Osman, Mohd Hafeez
    Saadbouh, Cheikh
    Sharif, Khaironi Yatim
    Admodisastro, Novia
    Basri, Muhammad Hadri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (10) : 907 - 916
  • [46] P4-HLDMC: A Novel Framework for DDoS and ARP Attack Detection and Mitigation in SD-IoT Networks Using Machine Learning, Stateful P4, and Distributed Multi-Controller Architecture
    Khedr, Walid I.
    Gouda, Ameer E.
    Mohamed, Ehab R.
    MATHEMATICS, 2023, 11 (16)