Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

Ubiquitous computing is a new paradigm in the world of information technology. Security plays a vital role in such networking environments. However, there are various methods available to generate different Media Access Control (MAC) addresses for the same system, which enables an attacker to spoof into the network. MAC spoofing is one of the major concerns in such an environment where MAC address can be spoofed using a wide range of tools and methods. Different methods can be prioritized to get cache table and attributes of ARP spoofing while targeting the identification of the attack. The routing trace-based technique is the predominant method to analyse MAC spoofing. In this paper, a detailed survey has been done on different methods to detect and prevent such risks. Based on the survey, a new proposal of security architecture has been proposed. This architecture makes use of Monitoring System (MS) that generates frequent network traces into MS table, server data and MS cache which ensures that the MAC spoofing is identified and blocked from the same environment.

[1]  Zhiping Jiang,et al.  The detection and prevention for ARP Spoofing based on Snort , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[2]  Khaled Elleithy,et al.  A New MAC Address Spoofing Detection Technique Based on Random Forests , 2016, Sensors.

[3]  Minho Park,et al.  Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks , 2013, Comput. Networks.

[4]  Mohammad Shikh-Bahaei,et al.  Cooperative Full-Duplex Physical and MAC Layer Design in Asynchronous Cognitive Networks , 2017, Wirel. Commun. Mob. Comput..

[5]  Guangjia Song,et al.  Anonymous-address-resolution model , 2016, Frontiers of Information Technology & Electronic Engineering.

[6]  Jin Kim IP Spoofing Detection Technique for Endpoint Security Enhancement , 2017 .

[7]  Subir Biswas,et al.  AH-MAC: Adaptive Hierarchical MAC Protocol for Low-Rate Wireless Sensor Network Applications , 2017, J. Sensors.

[8]  Han-Wei Hsiao,et al.  Constructing an ARP attack detection system with SNMP traffic data mining , 2009, ICEC.

[9]  Young-Sik Jeong,et al.  DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments , 2014, TheScientificWorldJournal.

[10]  Cheng-Zen Yang,et al.  Countermeasures against MAC address spoofing in public wireless networks using lightweight agents , 2010, 2010 The 5th Annual ICST Wireless Internet Conference (WICON).

[11]  Yong Sheng,et al.  Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[12]  Divya Bansal,et al.  Non-cryptographic methods of MAC spoof detection in wireless LAN , 2008, 2008 16th IEEE International Conference on Networks.

[13]  Shukor Abd Razak,et al.  Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure , 2015 .

[14]  Santosh Biswas,et al.  Detection of neighbor discovery protocol based attacks in IPv6 network , 2013 .

[15]  Prerna Arote,et al.  Detection and Prevention against ARP Poisoning Attack Using Modified ICMP and Voting , 2015, 2015 International Conference on Computational Intelligence and Networks.

[16]  Mourad Debbabi,et al.  Toward Automated MAC Spoofer Investigations , 2014, C3S2E.

[17]  Xing Hu,et al.  Dynamic Channel Slot Allocation Scheme and Performance Analysis of Cyclic Quorum Multichannel MAC Protocol , 2017 .

[18]  Kevin R. B. Butler,et al.  Securing ARP/NDP From the Ground Up , 2017, IEEE Transactions on Information Forensics and Security.

[19]  Archit Agrawal,et al.  Detection and prevention of ARP poisoning in dynamic IP configuration , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).

[20]  Yafeng Xu,et al.  The study on the college campus network ARP deception defense , 2010, 2010 2nd International Conference on Future Computer and Communication.

[21]  Ameer Al-Nemrat,et al.  Intelligent detection of MAC spoofing attack in 802.11 network , 2016, ICDCN.

[22]  M. Durairaj,et al.  ThreV - An Efficacious Algorithm to Thwart MAC Spoof DoS Attack in Wireless Local Area Infrastructure Network , 2014 .

[23]  Young-Sik Jeong,et al.  RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks , 2014, The Journal of Supercomputing.