An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 1
Abstract
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic.
Authors and Affiliations
Ahmed AbdelSalam, Wail Elkilani, Khalid Amin
Simultaneous Estimation of Geophysical Parameters with Microwave Radiometer Data based on Accelerated Simulated Annealing: SA
Method for geophysical parameter estimations with microwave radiometer data based on Simulated Annealing: SA is proposed. Geophysical parameters which are estimated with microwave radiometer data are closely relate...
Blind Image Quality Evaluation of Stitched Image using Novel Hybrid Warping Technique
Image stitching is collection of sequential images captured at fixed camera center having considerable amount of overlap and produces aesthetically pleasing seamless panoramic view. But, practically it is very difficult...
RSSI and Public Key Infrastructure based Secure Communication in Autonomous Vehicular Networks
Autonomous Vehicular Ad hoc Networks (A-VANET) is also known as intelligent transportation systems. A-VANET ensures timely and accurate communications between vehicle to vehicle and Vehicle to Roadside Unit (RSU) to impr...
E-learning System Which Allows Students’ Confidence Level Evaluation with Their Voice When They Answer to the Questions During Achievement Tests
E-learning system which allows students’ confidence level evaluation with their voice when they answer to the question during achievement tests is proposed. Through experiments of comparison of students’ confidence level...
OpenSimulator based Multi-User Virtual World: A Framework for the Creation of Distant and Virtual Practical Activities
The exponential growth of technology has contributed to the positive revolution of distance learning. E-learning is becoming increasingly used in the transfer of knowledge where instructors can model and script their cou...