An analysis of security solutions for ARP poisoning attacks and its effects on medical computing

Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the sensitive information like account details, patient records, genomics details for biomedical research and defence details leading to cyber-war. Data are vulnerable at any level of communication. The link-layer Address Resolution Protocol (ARP) is initiated for any data communication to take place among the hosts in a LAN. Because of the stateless nature of this protocol, it has been misused for illegitimate activities. These activities lead to the most devasting attacks like Denial of Service, Man-in-the-Middle, host impersonation, sniffing, and cache poisoning. Though various host-based and network-based intrusion detection/prevention techniques exist, they fail to provide a complete solution for this type of poisoning. This paper analyzes the existing defence systems against ARP attacks and proposes three different techniques for detecting and preventing the ARP attacks. The three techniques ensure security of traditional ARP and its impact in Medical computing where a single bit inversion could lead to wrong diagnosis.

[1]  B. Prabadevi,et al.  A framework to mitigate ARP sniffing attacks by cache poisoning , 2018, Int. J. Adv. Intell. Paradigms.

[2]  Kemal Akkaya,et al.  PARP-S: A secure piggybacking-based ARP for IEEE 802.11s-based Smart Grid AMI networks , 2015, Comput. Commun..

[3]  Hossein Bidgoli,et al.  Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations (Handbook of Information Security) , 2006 .

[4]  B. Prabadevi,et al.  Distributed Denial of service attacks and its effects on Cloud environment- a survey , 2014, The 2014 International Symposium on Networks, Computers and Communications.

[5]  S. Selvakumar,et al.  Genuine ARP (GARP): a broadcast based stateful authentication protocol , 2011, SOEN.

[6]  Vijay Kumar Chaurasia,et al.  Improved Secure Address Resolution Protocol , 2014, ArXiv.

[7]  Ankur Omer,et al.  Erratum to “Next Generation Sequencing: Potential and Application in Drug Discovery” , 2014, The Scientific World Journal.

[8]  Somnuk Puangpronpitag,et al.  An efficient and feasible solution to ARP Spoof problem , 2009, 2009 6th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.

[9]  Indranil Jana Effect of ARP poisoning attacks on modern operating systems , 2017, Inf. Secur. J. A Glob. Perspect..

[10]  Wassim El-Hajj,et al.  On investigating ARP spoofing security solutions , 2010, Int. J. Internet Protoc. Technol..

[11]  B. Prabadevi,et al.  A mitigation system for ARP cache poisoning attacks , 2017, ICC.

[12]  Stuart Cheshire IPv4 Address Conflict Detection , 2008, RFC.

[13]  David C. Plummer,et al.  Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware , 1982, RFC.

[14]  Young-Sik Jeong,et al.  DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments , 2014, TheScientificWorldJournal.

[15]  Patrick D. McDaniel,et al.  TARP: ticket-based address resolution protocol , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[16]  Archit Agrawal,et al.  Detection and prevention of ARP poisoning in dynamic IP configuration , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[17]  Zouheir Trabelsi,et al.  An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks , 2009, IWCMC.

[18]  Terry Bradley,et al.  Inverse Address Resolution Protocol , 1992, RFC.

[19]  Smoot Carl-Mitchell,et al.  Using ARP to implement transparent subnet gateways , 1987, RFC.

[20]  B. Prabadevi,et al.  Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks , 2017 .

[21]  Zouheir Trabelsi The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacks , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[22]  Danilo Bruschi,et al.  S-ARP: a secure address resolution protocol , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[23]  P. Pandey Prevention of ARP spoofing: A probe packet based technique , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[24]  Zouheir Trabelsi,et al.  Towards more sophisticated ARP Spoofing detection/prevention systems in LAN networks , 2009, 2009 International Conference on the Current Trends in Information Technology (CTIT).

[25]  Biju Issac Secure ARP and Secure DHCP Protocols to Mitigate Security Attacks , 2009, Int. J. Netw. Secur..