2010
DOI: 10.1007/978-3-642-13577-4_11
|View full text |Cite
|
Sign up to set email alerts
|

An Active Intrusion Detection System for LAN Specific Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Whenever ARP response packet is received and the cache needs to be updated, it compares against the correct IP -MAC address pairs and corrects the contents of the local ARP cache if they are different. Ramachandran and Nandi [15,16] checked inconsistencies of the addresses advertised by ARP request and TCP SYN packets. In order to build reliable IP -MAC pairs, they used the IP -MAC address advertised by ARP messages to build TCP SYN packets.…”
Section: Host-based Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Whenever ARP response packet is received and the cache needs to be updated, it compares against the correct IP -MAC address pairs and corrects the contents of the local ARP cache if they are different. Ramachandran and Nandi [15,16] checked inconsistencies of the addresses advertised by ARP request and TCP SYN packets. In order to build reliable IP -MAC pairs, they used the IP -MAC address advertised by ARP messages to build TCP SYN packets.…”
Section: Host-based Approachesmentioning
confidence: 99%
“…They maintain IP -MAC addresses of the ARP cache, periodically compare if changes have been made to the ARP cache, and alert administrators if necessary. These tools are cheaper than switches with port security but have slower response time compared to switches [16]. Furthermore, false alarms occur when genuine IP (or MAC) address changes occur.…”
Section: Server-based Approachesmentioning
confidence: 99%
“…Let there be a single malicious host m in the LAN having IP-MAC pair IP(m)-MAC(m). 2 . It is assumed that Authenticated and Spoofed tables are empty.…”
Section: Theoremmentioning
confidence: 99%
“…Various mechanisms have been proposed to detect and mitigate these ARP attacks at both the host-level and network-level. In [2], a literature review on network based IDS for detecting ARP spoofing attacks with their drawbacks have been discussed. The authors also present a new network based IDS to detect such spoofing attacks and highlights how many of the drawbacks are eliminated.…”
Section: Introductionmentioning
confidence: 99%