TY - GEN
T1 - The robustness of Microsoft Windows and Apple Mac OS X against ARP cache poisoning based network attacks
AU - Trabelsi, Zouheir
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016/3/30
Y1 - 2016/3/30
N2 - Robust security measures are integrated into new release versions of operating systems (OSs) to ensure that users have a more secure and reliable environment to run their daily tasks. In this paper, through extensive practical experiments, we evaluate and compare the effectiveness of popular versions of Microsoft Windows OSs and Apple Mac OS X in thwarting Address Resolution Protocol (ARP) cache poisoning attack in Local Area Network (LAN). The experimental results demonstrate clearly that all tested versions of Windows OSs and Apple Mac OS X are still very vulnerable to the ARP cache poisoning attack, and do not deploy built-in efficient security features to prevent the success of this attack. In addition, the experimental results directly allow to contradict the common belief that Windows OSs are always less security aspects compared to Apple OSs.
AB - Robust security measures are integrated into new release versions of operating systems (OSs) to ensure that users have a more secure and reliable environment to run their daily tasks. In this paper, through extensive practical experiments, we evaluate and compare the effectiveness of popular versions of Microsoft Windows OSs and Apple Mac OS X in thwarting Address Resolution Protocol (ARP) cache poisoning attack in Local Area Network (LAN). The experimental results demonstrate clearly that all tested versions of Windows OSs and Apple Mac OS X are still very vulnerable to the ARP cache poisoning attack, and do not deploy built-in efficient security features to prevent the success of this attack. In addition, the experimental results directly allow to contradict the common belief that Windows OSs are always less security aspects compared to Apple OSs.
KW - ARP cache poisoning
KW - ARP statefull inspection
KW - Denial-of-Service attack
KW - Man-in-the-Middle attack
KW - Network attack
UR - http://www.scopus.com/inward/record.url?scp=84966600767&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84966600767&partnerID=8YFLogxK
U2 - 10.1109/CCNC.2016.7444939
DO - 10.1109/CCNC.2016.7444939
M3 - Conference contribution
AN - SCOPUS:84966600767
T3 - 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016
SP - 1074
EP - 1079
BT - 2016 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 13th IEEE Annual Consumer Communications and Networking Conference, CCNC 2016
Y2 - 6 January 2016 through 13 January 2016
ER -