The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07) 2007
DOI: 10.1109/icdcsw.2007.19
|View full text |Cite
|
Sign up to set email alerts
|

An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks

Abstract: The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) to physical addresses (MAC). The protocol has proved to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP cache poisoning or ARP spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access to sensitive information. Several schemes to mitigate, detect and prevent these attacks have been proposed, but each has its limitatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
48
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 86 publications
(48 citation statements)
references
References 8 publications
0
48
0
Order By: Relevance
“…The spectrogram for this time series is shown in Figure 6 For the first fourth of the time series, a single polling period of 3 seconds is used. The corresponding frequency component is present at 1 3 Hz, which can be observed as a horizontal red line in the spectrogram. After some time, a second polling series starts, with a period of 5 seconds.…”
Section: Spectral Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…The spectrogram for this time series is shown in Figure 6 For the first fourth of the time series, a single polling period of 3 seconds is used. The corresponding frequency component is present at 1 3 Hz, which can be observed as a horizontal red line in the spectrogram. After some time, a second polling series starts, with a period of 5 seconds.…”
Section: Spectral Analysismentioning
confidence: 99%
“…Note that a malicious host masqueraded as such HMI, by spoofing its IP address, could perform the same attack. Interested readers are referred to [1] for a discussion of mechanisms that can protect against such attacks.…”
Section: Dealing With Real-world Attack Scenariosmentioning
confidence: 99%
See 1 more Smart Citation
“…DAI uses a technique called DHCP-Snooping [144] to build and maintain its trusted IP-MAC address database. While DAI is one of the most promising non-cryptographic solutions to mitigate ARP spoofing attacks, its drawbacks include its proprietary nature and relatively high cost [22,145].…”
Section: Traditional Arp Spoofing Countermeasuresmentioning
confidence: 99%
“…A survey of these measures is provided in [22]. One of the most prominent and widely used ARP spoofing mitigation approaches is Dynamic ARP Inspection (DAI) [25].…”
Section: Traditional Arp Spoofing Countermeasuresmentioning
confidence: 99%