ARP Modification for Prevention of IP Spoofing

@article{Kang2014ARPMF,
  title={ARP Modification for Prevention of IP Spoofing},
  author={Jung-Ha Kang and Yang Sun Lee and Jae Young Kim and Eun-Gi Kim},
  journal={J. Inform. and Commun. Convergence Engineering},
  year={2014},
  volume={12},
  pages={154-160}
}
The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today… 

Figures and Tables from this paper

Address resolution protocol spoofing attacks and security approaches: A survey

Various effective approaches, security issues in ARP spoofing, and poisoning attacks are discussed, including various effective approaches to mitigate ARP attacks and detect ARP poisoning that can reduce the attack.

A New Detection and Prevention System for ARP Attacks Using Static Entry

A new approach that achieves various goals and has multiple benefits not found in the usual techniques is proposed, which is unique in solving the problem of detection and prevention of attacks against ARP and impersonation attacks at local area networks.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types

The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program.

A study on the Kismet-based wireless intrusion prevention system

A system to detect and prevent security threats that occur in a wireless environment using the open source-based, Kismet and Wireshark and uses Iptable to prevent intrusion is proposed.

Experimental Results for an Indoor Localization Method based on Angle-Delay Signatures

Experimental results for a location estimation method, evaluated in a static, non-line-of-sight indoor environment at 6.25 GHz, using an array antenna to locate single-antenna remote terminals using an angle-delay signature.

References

SHOWING 1-10 OF 16 REFERENCES

Research on the Defense Against ARP Spoofing Attacks Based on Winpcap

The thesis presents a method of defending ARP spoofing attacks based on WinPcaP, and the system just captures the ARP packets flowing through the local card, and sends the packets to the analysis module.

Spoofing prevention method

  • A. Bremler-BarrH. Levy
  • Computer Science
    Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
  • 2005
A new approach for filtering spoofed IP packets, called spoofing prevention method (SPM), is proposed. The method enables routers closer to the destination of a packet to verify the authenticity of

Light weight approach for IP-ARP spoofing detection and prevention

  • S. BhirudV. Katkar
  • Computer Science
    2011 Second Asian Himalayas International Conference on Internet (AH-ICI)
  • 2011
A simple and light-weight mechanism for detection and prevention of IP-ARP spoofing attacks is presented and experimental results are provided to support the proposal.

Linux Device Drivers

This book discusses the role of the Device Driver, the Kernel Classes of Devices and Modules, and more about how Mounting and Unmounting works.

Requirements for Internet Hosts - Communication Layers

This RFC is an official specification for the Internet community. It incorporates by reference, amends, corrects, and supplements the primary protocol standards documents relating to hosts.

Building Embedded Linux Systems

This book is structured to gradually introduce readers to the intricacies of embedded Linux, with detailed information and examples in each chapter that culminate in describing how Linux is actually put on an embedded device.

Development of an Edge-Based Algorithm for Moving-Object Detection Using Background Modeling

The result of the performance evaluation shows that the proposed edge-based background modeling method can detect moving objects efficiently in real-world scenarios.

Design challenges and solutions for ultra-high-density monolithic 3D ICs

Various design styles available in M3D are explored and design techniques to obtain GDSII-level signoff quality results for each of these styles are presented.

and T

  • Li, “Research on the defense against ARP spoofing attacks based on WinPcaP,” in Proceedings of the 2nd International Workshop on Education Technology and Computer Science (ETCS), Wuhan, China, pp. 762-765
  • 2010