Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks

Mohamed Al-Hemairy, Saad Amin, Zouheir Trabelsi

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)

    Abstract

    The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) to physical addresses [MAC] and we can't imagine a communications between networks without the support of ARP protocol. However, ARP had been misused by many malicious hosts for illegitimate penetration; ARP Spoofing is one example for such illegal access. ARP Spoofing can enable malicious hosts to perform Man-in-the-Middle attacks [MiM] as well as a Denial of Service attacks [DoS]. Unfortunately, ARP Spoofing has not been focused by security experts or solutions, e.g, Intrusion Detection Systems or Intrusion Protection Systems [IDS/IPS]. In this research we evaluate the most famous & expensive detection and prevention [IDS/IPS] systems for detecting all types of ARP spoofing attacks and introduce an algorithm which can be implemented in IDS/IPS systems to enhance it's security.

    Original languageEnglish
    Title of host publicationProceedings of the 2009 International Conference on the Current Trends in Information Technology, CTIT 2009
    Pages225-230
    Number of pages6
    DOIs
    Publication statusPublished - Dec 1 2009
    Event2009 International Conference on the Current Trends in Information Technology, CTIT 2009 - Dubai, United Arab Emirates
    Duration: Dec 15 2009Dec 16 2009

    Publication series

    NameProceedings of the 2009 International Conference on the Current Trends in Information Technology, CTIT 2009

    Other

    Other2009 International Conference on the Current Trends in Information Technology, CTIT 2009
    Country/TerritoryUnited Arab Emirates
    CityDubai
    Period12/15/0912/16/09

    ASJC Scopus subject areas

    • Computer Science(all)
    • Control and Systems Engineering

    Fingerprint

    Dive into the research topics of 'Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks'. Together they form a unique fingerprint.

    Cite this