{"title":"Attack on the Address Resolution Protocol","authors":"P. Stepanov, G. Nikonova, T. Pavlychenko, A. Gil","doi":"10.1109/EnT50437.2020.9431297","DOIUrl":null,"url":null,"abstract":"The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effects on the attacked node are given. An example of the script that sends a fake ARP packet is proposed.","PeriodicalId":129694,"journal":{"name":"2020 International Conference Engineering and Telecommunication (En&T)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Conference Engineering and Telecommunication (En&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EnT50437.2020.9431297","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effects on the attacked node are given. An example of the script that sends a fake ARP packet is proposed.