Analysis of various ARP poisoning mitigation techniques: A comparison

Nikhil Tripathi, B. Mehtre
{"title":"Analysis of various ARP poisoning mitigation techniques: A comparison","authors":"Nikhil Tripathi, B. Mehtre","doi":"10.1109/ICCICCT.2014.6992942","DOIUrl":null,"url":null,"abstract":"Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.","PeriodicalId":6615,"journal":{"name":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","volume":"69 1","pages":"125-132"},"PeriodicalIF":0.0000,"publicationDate":"2014-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCICCT.2014.6992942","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
各种ARP中毒缓解技术分析:比较
地址解析协议(ARP)是计算机通信中最基本、最常用的协议之一。在局域网内,ARP报文用于将IP地址解析为对应的MAC地址。然而,该协议中的一些限制使其相当脆弱。两个最突出的限制是ARP的未经身份验证和无状态特性。攻击者可以很容易地利用这些漏洞谋取私利。ARP中毒被认为是一种统一的基础攻击,用来发动更高级的攻击。文献中已经提出了几种解决方案来检测和防止这些攻击。然而,所有提出的解决方案都有一定的局限性。一些解决方案在一组特殊场景中有效,而其他解决方案则非常适合属于不同频段的场景。随着时间的推移,ARP中毒的新技术不断发展,研究人员越来越有动力提出新的解决方案。在本文中,我们提出了不同的解决方案的比较分析,这是相当流行的文献。我们根据被认为是拟议解决办法的限制因素的一些重要因素,比较了不同的缓解技术。这些因素来源于局域网内ARP中毒攻击发生时可能出现的情况。本文同样介绍了一个简短的表格格式,它提供了不同方案之间比较的快速概述。通过比较研究,可以进一步提供和构建一种更高效、更有效的方案,该方案一方面具有不同缓解技术的综合优势,另一方面又摆脱了原有的局限性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Adept spectral filter for fading nonisotropic channel model Received signal strength index estimation using Kalman Filter for fuzzy based transmission power control in wireless sensor networks An efficient scalar multiplication algorithm for ECC in WSNs An electrochemical DNA-Prussian blue-carbon paste biosensor for the detection of ascorbic acid in pharmaceuticals Implementing One Time Password based security mechanism for securing personal health records in cloud
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1