2005
DOI: 10.1007/11593980_18
|View full text |Cite
|
Sign up to set email alerts
|

Detecting ARP Spoofing: An Active Technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 63 publications
(32 citation statements)
references
References 1 publication
0
32
0
Order By: Relevance
“…Since ARP is a widely deployed protocol in every system, it has been subject to various attacks [12]. ARP cache poisoning is one of such attacks at the MAC layer in which an attacker modifies the address mapping in the ARP table by sending a malicious ARP reply packet to the victim machine.…”
Section: Attacks On Arpmentioning
confidence: 99%
“…Since ARP is a widely deployed protocol in every system, it has been subject to various attacks [12]. ARP cache poisoning is one of such attacks at the MAC layer in which an attacker modifies the address mapping in the ARP table by sending a malicious ARP reply packet to the victim machine.…”
Section: Attacks On Arpmentioning
confidence: 99%
“…The authors of [12] suggested search methods. However, search methods do not solve the ARP spoofing attack if the attacker is intelligent and customized its protocol stack, and this approach requires extra administration efforts.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, there are detection mechanisms that work by monitoring ARP packets and alerting administrators through passive detection (e.g., arpwatch [51]), active detection [52] and Intrusion Detection Systems (IDS) (e.g., snort [53]). However, these approaches will not be applicable to the proposed approach in this study due to the size of AMI applications and unavailability of administrators.…”
Section: Arp Attacksmentioning
confidence: 99%
“…Since ARP is a widely deployed protocol in every system, it has been subject to various attacks [52]. ARP cache poisoning is one of such attacks at the MAC layer in which an attacker modifies the address mapping in the ARP table by sending a malicious ARP reply message to the victim machine.…”
Section: Attacks On Arpmentioning
confidence: 99%