ASA: Agent-based secure ARP cache management

نویسندگان

  • Myeongjin Oh
  • Young-Gab Kim
  • Seungpyo Hong
  • Sung Deok Cha
چکیده

Address resolution protocol (ARP) is widely used tomaintainmapping between data link (e.g.MAC) and network (e.g. IP) layer addresses. Although most hosts rely on automated and dynamic management of ARP cache entries, current implementation is well-known to be vulnerable to spoofing or denial of service (DoS) attacks. There are many tools that exploit vulnerabilities of ARP protocols, and past proposals to address the weaknesses of the ‘original’ ARP design have been unsatisfactory. Suggestions that ARP protocol definition be modified would cause serious and unacceptable compatibility problems. Other proposals require customised hardware be installed to monitor malicious ARP traffic, and many organisations cannot afford such cost. This study demonstrates that one can effectively eliminate most threats caused by the ARP vulnerabilities by installing anti-ARP spoofing agent (ASA), which intercepts unauthenticated exchange of ARP packets and blocks potentially insecure communications. The proposed approach requires neither modification of kernel ARP software nor installation of traffic monitors. Agent uses user datagram protocol (UDP) packets to enable networking among hosts in a transparent and secure manner. The authors implemented agent software on Windows XP and conducted an experiment. The results showed that ARP hacking tools could not penetrate hosts protected by ASA.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing ARP From the Bottom Up

The basis for all network communication is the Address Resolution Protocol, which maps IP addresses to a device’s MAC identifier. ARP resolution has long been vulnerable to spoofing and other attacks, and past proposals to secure the protocol have focused on key ownership rather than the identity of the machine itself. This paper introduces arpsec, a secure ARP protocol that is based on host at...

متن کامل

S-ARP: a Secure Address Resolution Protocol

Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the Address Resolution Protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a messa...

متن کامل

Detection and prevention of ARP cache poisoning

Acknowledgements It is a great pleasure to have an opportunity to thanks valuable beings for their continuous support and inspiration throughout the thesis work. I would like to extend my gratitude towards Dr. for all the guidance and great knowledge he shared during our course. The abundance of knowledge he has always satisfied our queries at every point. Thanks to Mr. Sumit Miglani, My guide ...

متن کامل

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation

This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attack...

متن کامل

A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning

This paper discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC (Ethernet) address mapping in another host’s ARP cache. We discuss design constraints for a solution: the solution needs to be implemented in middleware, without access or change to any operat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IET Communications

دوره 6  شماره 

صفحات  -

تاریخ انتشار 2012