Address Resolution Protocol (ARP) is the fundamental and one of the most frequently used protocol involved in computer communications. Within a LAN, ARP messages are used to resolve IP addresses into corresponding MAC addresses. Nevertheless, some of the limitations within this protocol make it rather vulnerable. The two most prominent limitations are - unauthenticated and stateless nature of ARP. The attackers can easily exploit these loopholes for their personal gain. ARP poisoning is considered as unitary of the basic attacks which is utilized to launch higher level attacks. Several solutions have been proposed in the literature to detect and prevent these attacks. However, all of the proposed solutions are limited to a certain extent. Some solutions are effective in a special set of scenarios while others are rather suited for scenarios belonging to a different band. As new techniques of ARP poisoning have evolved with time, researchers are getting motivated to propose new solutions. In this paper, we have presented a comparative analysis of different proposed solutions which are rather popular in the literature. We have compared different mitigation techniques based on some of the important factors that are considered as limitations to the proposed solutions. These factors are derived from the scenarios which are possible within a LAN when an ARP Poisoning attack is launched. A brief tabular format is likewise introduced in this paper which offers a fast overview of comparison between different proposed schemes. This comparative study can further be used to offer and build up a more efficient and effective scheme which, on one hand, enjoys the combined advantage of different mitigation techniques and on the other hand, does not hold the old limitations.
[1]
Santosh Biswas,et al.
A host based DES approach for detecting ARP spoofing
,
2011,
2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[2]
Patrick D. McDaniel,et al.
TARP: ticket-based address resolution protocol
,
2005,
21st Annual Computer Security Applications Conference (ACSAC'05).
[3]
P. Pandey.
Prevention of ARP spoofing: A probe packet based technique
,
2013,
2013 3rd IEEE International Advance Computing Conference (IACC).
[4]
Mudge.
Insider Threat
,
2003,
login Usenix Mag..
[5]
Salvatore J. Stolfo,et al.
Addressing the Insider Threat
,
2009,
IEEE Security & Privacy Magazine.
[6]
Nikhil Tripathi,et al.
An ICMP based secondary cache approach for the detection and prevention of ARP poisoning
,
2013,
2013 IEEE International Conference on Computational Intelligence and Computing Research.
[7]
George Fyffe,et al.
Insider Threats: Addressing the insider threat
,
2008
.
[8]
Danilo Bruschi,et al.
S-ARP: a secure address resolution protocol
,
2003,
19th Annual Computer Security Applications Conference, 2003. Proceedings..
[9]
Martin Hershkowitz.
The “Insider” Threat
,
2007
.
[10]
Shashikala Tapaswi,et al.
A centralized detection and prevention technique against ARP poisoning
,
2012,
Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).