Various Solutions for Address Resolution Protocol Spoofing Attacks

Security is at the forefront of most networks, and many companies implement a comprehensive security policy encompassing many of the OSI layers, from application layer all the way down to IP security. However, one area that is often left untouched is hardening Layer 2 and this can open the network to a variety of attacks and compromises. Address resolution protocol is the mapping of IP address to the MAC address (layer 3 to layer2 mapping). ARP provides no authentication mechanism to the incoming request packets this is the reason that any client can forge an ARP message contains malicious information to poison the ARP cache of target host. There are many possible attacks on ARP which can make the communication unsecure such as man-in-the-middle (MITM), Denial of service (DOS), cloning attack, session hijacking and many more attacks.

[1]  C. V. Guru Rao A Frame Work for Single Sketch Based Multibiometric Cryptosystems , 2013 .

[2]  Yunlan Zhao,et al.  Research on the Defense Against ARP Spoofing Attacks Based on Winpcap , 2010, 2010 Second International Workshop on Education Technology and Computer Science.

[3]  Santosh Biswas,et al.  An Active Intrusion Detection System for LAN Specific Attacks , 2010, AST/UCMA/ISA/ACN.

[4]  Zhiping Jiang,et al.  The detection and prevention for ARP Spoofing based on Snort , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[5]  Dongwon Kim,et al.  Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks , 2010, IEEE Communications Letters.

[6]  A. Govardhan,et al.  Discovering Multi-Level Association Rules using FuzzyHierarchies , 2014 .

[7]  Cristina L. Abad,et al.  Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt , 2009, 2009 Latin American Network Operations and Management Symposium.

[8]  Kumara Swamy Authentication in Android Smart Phones Using Gestures and Security Pin , 2013 .

[9]  Sukumar Nandi,et al.  Detecting ARP Spoofing: An Active Technique , 2005, ICISS.

[10]  Andrew R. Baker,et al.  Snort 2.1 intrusion detection , 2004 .

[11]  Young-Gab Kim,et al.  ASA: Agent-based secure ARP cache management , 2012, IET Commun..

[12]  Usha Rani,et al.  Mining Multi Level Association Rules Using Fuzzy Logic , 2013 .

[13]  Santosh Biswas,et al.  An Active Host-Based Detection Mechanism for ARP-Related Attacks , 2011 .

[14]  W. Lilakiatsakun,et al.  P-ARP: A novel enhanced authentication scheme for securing ARP , 2011 .

[15]  Patrick D. McDaniel,et al.  TARP: ticket-based address resolution protocol , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).

[16]  Chin-Tser Huang,et al.  A secure address resolution protocol , 2003, Comput. Networks.

[17]  Danilo Bruschi,et al.  S-ARP: a secure address resolution protocol , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[18]  S. P. Anandraj,et al.  Enhancement of Content Distribution and Verification in Network Coding , 2013 .

[19]  Roney Philip Securing Wireless Networks from ARP Cache Poisoning , 2007 .

[20]  R. Vijaya Prakash,et al.  Knowledge Discovery from Dynamically Evolving User Profiles , 2014 .

[21]  T. Chomsiri,et al.  Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.

[22]  G GoudaMohamed,et al.  A secure address resolution protocol , 2003 .

[23]  K. N. Dollman,et al.  - 1 , 1743 .

[24]  Wassim El-Hajj,et al.  Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache , 2007, 2007 IEEE International Conference on Communications.

[25]  Jin-Wook Chung,et al.  Network Security Management Using ARP Spoofing , 2004, ICCSA.

[26]  Vipul Goyal,et al.  An Efficient Solution to the ARP Cache Poisoning Problem , 2005, ACISP.