Abstract | ||
---|---|---|
The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-middle attack (MiM) ] and gain access to sensitive information, or perform denial of service attack (DoS) on target hosts. Several security solutions, such as high-cost LAN switches and intrusion detection or prevention systems (IDS/IPS), are currently used to detect and prevent these attacks. In this paper, we evaluate, through extensive practical experiments, how effective these security solutions are in detecting ARP spoofing. We clearly show that ARP spoofing has not been given enough attention by most common security solutions which lack efficient detection and prevention mechanisms. We then propose an optimal algorithm that is capable of detecting all various ARP spoofing attacks; especially those not detected using the current mechanisms. The suggested algorithm can be easily integrated in any available security solution with very minimal overhead. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1504/IJIPT.2010.032618 | IJIPT |
Keywords | Field | DocType |
common security solution,z. and el-hajj,w. 2010 'on investigating arp spoofing security solutions',various arp spoofing attack,arp spoofing,pp.x-x.,security solution,malicious host,: intrusion detection system,vol. x,available security solution,efficient detection,arp spoofing security solution,man-in-the-middle attack,no. x,int. j. internet protocol technology,dos attack. reference to this paper should be made as follows: trabelsi,arp spoofing attack,intrusion detection,address resolution protocol,internet protocol,denial of service attack,mim,dos attacks,intrusion detection systems,dos attack,denial of service,intrusion detection system,network security,man in the middle attacks,man in the middle attack | Protocol spoofing,Spoofing attack,Denial-of-service attack,IP address spoofing,Computer security,Computer science,Network security,Computer network,ARP spoofing,Address Resolution Protocol,Intrusion detection system | Journal |
Volume | Issue | ISSN |
5 | 1/2 | 1743-8209 |
Citations | PageRank | References |
4 | 0.54 | 1 |
Authors | ||
2 |
Name | Order | Citations | PageRank |
---|---|---|---|
Zouheir Trabelsi | 1 | 136 | 27.78 |
Wassim El-Hajj | 2 | 161 | 21.00 |