An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 1
Abstract
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks. Using static ARP entries is considered the most effective way to prevent ARP spoofing. Yet, ARP spoofing mitigation methods depending on static ARP have major drawbacks. In this paper, we propose a scalable technique to prevent ARP spoofing attacks, which automatically configures static ARP entries. Every host in the local network will have a protected non-spoofed ARP cache. The technique operates in both static and DHCP based addressing schemes, and Scalability of the technique allows protecting of a large number of users without any overhead on the administrator. Performance study of the technique has been conducted using a real network. The measurement results have shown that the client needs no more than one millisecond to register itself for a protected ARP cache. The results also shown that the server can a block any attacker in just few microsecond under heavy traffic.
Authors and Affiliations
Ahmed AbdelSalam, Wail Elkilani, Khalid Amin
A Novel Approach to Implement Fixed to Mobile Convergence in Mobile Adhoc Networks
Fixed to Mobile Convergence, FMC is one of the most celebrated applications of wireless networks, where a telephonic call from some fixed telephonic infrastructure is forwarded to a mobile device. Problem of extending th...
Opinion Mining and Analysis for Arabic Language
Social media constitutes a major component of Web 2.0 and includes social networks, blogs, forum discussions, micro-blogs, etc. Users of social media generate a huge volume of reviews and comments on daily basis. These r...
Comparing Hybrid Tool for Static and Dynamic Object-Oriented Metrics
Software metrics are created and used by the distinctive programming associations intended for assessing, guaranteeing program excellence, activity, and software recovery. Software metrics have turned into a basic part o...
Towards Understanding Internet of Things Security and its Empirical Vulnerabilities: A Survey
The Internet of things is no longer a concept; it is a reality already changing our lives. It aims to interconnect almost all daily used devices to help them exchange contextualized data in order to offer services adequa...
Stylometric Techniques for Multiple Author Clustering
In 1598-99 printer, William Jaggard named Shakespeare as the sole author of The Passionate Pilgrim even though Jaggard chose a number of non-Shakespearian poems in the volume. Using a neurolinguistics approach to authors...