Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense

G. A. Sukkar, Ramzi R. Saifan, Sufian M Khwaldeh, M. Maqableh, I. Jafar
{"title":"Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense","authors":"G. A. Sukkar, Ramzi R. Saifan, Sufian M Khwaldeh, M. Maqableh, I. Jafar","doi":"10.4236/CN.2016.83012","DOIUrl":null,"url":null,"abstract":"Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"3 1","pages":"118-130"},"PeriodicalIF":0.0000,"publicationDate":"2016-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/CN.2016.83012","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

Networks have become an integral part of today’s world. The ease of deployment, low-cost and high data rates have contributed significantly to their popularity. There are many protocols that are tailored to ease the process of establishing these networks. Nevertheless, security-wise precautions were not taken in some of them. In this paper, we expose some of the vulnerability that exists in a commonly and widely used network protocol, the Address Resolution Protocol (ARP) protocol. Effectively, we will implement a user friendly and an easy-to-use tool that exploits the weaknesses of this protocol to deceive a victim’s machine and a router through creating a sort of Man-in-the-Middle (MITM) attack. In MITM, all of the data going out or to the victim machine will pass first through the attacker’s machine. This enables the attacker to inspect victim’s data packets, extract valuable data (like passwords) that belong to the victim and manipulate these data packets. We suggest and implement a defense mechanism and tool that counters this attack, warns the user, and exposes some information about the attacker to isolate him. GNU/Linux is chosen as an operating system to implement both the attack and the defense tools. The results show the success of the defense mechanism in detecting the ARP related attacks in a very simple and efficient way.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
ARP (Address Resolution Protocol,地址解析协议):欺骗攻击及防御建议
网络已经成为当今世界不可分割的一部分。易于部署、低成本和高数据速率是它们受欢迎的重要原因。有许多专为简化建立这些网络的过程而定制的协议。然而,其中一些国家并没有采取明智的安全预防措施。在本文中,我们揭示了一个普遍和广泛使用的网络协议,地址解析协议(ARP)协议中存在的一些漏洞。实际上,我们将实现一个用户友好且易于使用的工具,利用该协议的弱点,通过创建一种中间人(MITM)攻击来欺骗受害者的机器和路由器。在MITM中,所有流出或到达受害机器的数据都将首先通过攻击者的机器。这使得攻击者能够检查受害者的数据包,提取属于受害者的有价值的数据(如密码)并操纵这些数据包。我们建议并实现一种防御机制和工具来对抗这种攻击,警告用户,并公开有关攻击者的一些信息以隔离他。选择GNU/Linux作为操作系统来实现攻击和防御工具。实验结果表明,该防御机制能够以一种简单有效的方式检测出ARP相关的攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Cooperative Cognitive Radio Spectrum Sensing Based on Correlation Sum Method with Linear Equalization ADS-B Reception Error Correction Based on the LSTM Neural-Network Model Why the Incoherent Paradigm is for the Future Wireless Networks? A Meta-Learning Approach for Aircraft Trajectory Prediction Analyses of Virtual MIMO Multi-User System Performance with Linear Precoding Schemes Using Indoor Measurements at 5 GHz
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1