Abstract
Robust security measures are integrated into new release versions of operating systems (OSs) to ensure that users have a more secure and reliable environment to run their daily tasks. In this paper, through extensive practical experiments, we evaluate and compare the effectiveness of popular versions of Microsoft Windows OSs and Apple Mac OS X in thwarting Address Resolution Protocol (ARP) cache poisoning attack in Local Area Network (LAN). The experimental results demonstrate clearly that all tested versions of Windows OSs and Apple Mac OS X are still very vulnerable to the ARP cache poisoning attack, and do not deploy built-in efficient security features to prevent the success of this attack. In addition, the experimental results directly allow to contradict the common belief that Windows OSs are always less security aspects compared to Apple OSs.
Original language | English |
---|---|
Title of host publication | 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016 |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
Pages | 1074-1079 |
Number of pages | 6 |
ISBN (Print) | 9781467392921 |
DOIs | |
Publication status | Published - Mar 30 2016 |
Event | 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016 - Las Vegas, United States Duration: Jan 6 2016 → Jan 13 2016 |
Other
Other | 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016 |
---|---|
Country/Territory | United States |
City | Las Vegas |
Period | 1/6/16 → 1/13/16 |
Keywords
- ARP cache poisoning
- ARP statefull inspection
- Denial-of-Service attack
- Man-in-the-Middle attack
- Network attack
ASJC Scopus subject areas
- Computer Science Applications
- Computer Networks and Communications
- Hardware and Architecture