Loading...
Please wait, while we are loading the content...
Similar Documents
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
| Content Provider | Semantic Scholar |
|---|---|
| Author | Abdelsalam, Ahmed M. |
| Copyright Year | 2014 |
| Abstract | ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic. Keyword—component; layer two attacks; ARP spoofing; ARP cache poisoning; Static ARP entries |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://thesai.org/Downloads/Volume5No1/Paper_14-An_Automated_approach_for_Preventing_ARP_Spoofing_Attack_using_Static_ARP_Entries.pdf |
| Alternate Webpage(s) | http://www.thesai.org/Downloads/Volume5No1/Paper_14-An_Automated_approach_for_Preventing_ARP_Spoofing_Attack_using_Static_ARP_Entries.pdf |
| Language | English |
| Access Restriction | Open |
| Subject Keyword | ARP spoofing Algorithm CPU cache Computer DNS spoofing Denial (Psychology) Denial-of-service attack Keyword Local Area Networks Man-in-the-middle attack Overhead (computing) Poisoning RERE gene Response time (technology) Scalability Server (computing) Service layer Solutions Spoofing attack Stateless protocol Workload |
| Content Type | Text |
| Resource Type | Article |