An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks

Senda Hammouda, Zouheir Trabelsi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

After the ARP protocol was drafted, a subtle weakness in the protocol was discovered. In fact, ARP provides no means to establish the authenticity of the source of incoming ARP packets. That's why any host of a LAN network can forge an ARP message containing malicious information to poison the ARP caches of target hosts. This lack of authentication mechanisms has made ARP vulnerable to a raft of IP-based impersonation, Man-in-the-Middle (MiM) and DoS attacks. In this paper we discuss a security solution to solve the ARP vulnerabilities and authenticity issues. For that purpose, a novel secure extended ARP protocol is proposed. In addition, the LAN switch has been enhanced to assume the role of "Trusted Authority" and assure the hosts authentication while exchanging ARP messages.

Original languageEnglish
Title of host publicationProceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
PublisherAssociation for Computing Machinery (ACM)
Pages942-946
Number of pages5
ISBN (Print)9781605585697
DOIs
Publication statusPublished - 2009
Event2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009 - Leipzig, Germany
Duration: Jun 21 2009Jun 24 2009

Publication series

NameProceedings of the 2009 ACM International Wireless Communications and Mobile Computing, Connecting the World Wirelessly, IWCMC 2009

Other

Other2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009
Country/TerritoryGermany
CityLeipzig
Period6/21/096/24/09

Keywords

  • ARP cache poisoning attack
  • ARP protocol
  • Man-in-the-middle attack

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Computer Science Applications
  • Software

Fingerprint

Dive into the research topics of 'An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks'. Together they form a unique fingerprint.

Cite this