2015 IEEE Trustcom/BigDataSE/Ispa 2015
DOI: 10.1109/trustcom.2015.536
|View full text |Cite
|
Sign up to set email alerts
|

ARP Cache Poisoning Mitigation and Forensics Investigation

Abstract: Abstract-Address Resolution Protocol (ARP) cache spoofing or poisoning is an OSI layer 2 attack that exploits the statelessness vulnerability of the protocol to make network hosts susceptible to issues such as Man in the Middle attack, host impersonation, Denial of Service (DoS) and session hijacking.In this paper, a quantitative research approach is used to propose forensic tools for capturing evidences and mitigating ARP cache poisoning. The baseline approach is adopted to validate the proposed tools. The ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 15 publications
(14 reference statements)
0
2
0
Order By: Relevance
“…For example, when an Ehernet/EoC frame that embeds a ARP request is heard, the sender protocol address (SPA) field is used to create an entry ⟨SA,SPA,port⟩ in the EFDB for that port. This resembles ARP snooping [22], but it is not related to security. This approach is not more vulnerable against ARP spoofing attacks than switched Ethernet: in fact, compromised nodes may impersonate other nodes by changing their MAC-48 addresses, hence corrupting the FDB also in conventional switches.…”
Section: B I4oc Operationmentioning
confidence: 99%
“…For example, when an Ehernet/EoC frame that embeds a ARP request is heard, the sender protocol address (SPA) field is used to create an entry ⟨SA,SPA,port⟩ in the EFDB for that port. This resembles ARP snooping [22], but it is not related to security. This approach is not more vulnerable against ARP spoofing attacks than switched Ethernet: in fact, compromised nodes may impersonate other nodes by changing their MAC-48 addresses, hence corrupting the FDB also in conventional switches.…”
Section: B I4oc Operationmentioning
confidence: 99%
“…[10] vi. Real-time Detection Authors in [11] proposed a real-time detection of Medium Access Control (MAC) layer attacks in wireless networks is proposed. There can be different kinds of Denial of Service (DoS) attacks observed at the MAC layer such as misbehavior and selfish attacks.…”
Section: One Way Hash Chainmentioning
confidence: 99%