Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks

Mohamed Al-Hemairy, Saad Amin, Zouheir Trabelsi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

16 Citations (Scopus)

Abstract

The Address Resolution Protocol (ARP) is used by computers to map network addresses (IP) to physical addresses [MAC] and we can't imagine a communications between networks without the support of ARP protocol. However, ARP had been misused by many malicious hosts for illegitimate penetration; ARP Spoofing is one example for such illegal access. ARP Spoofing can enable malicious hosts to perform Man-in-the-Middle attacks [MiM] as well as a Denial of Service attacks [DoS]. Unfortunately, ARP Spoofing has not been focused by security experts or solutions, e.g, Intrusion Detection Systems or Intrusion Protection Systems [IDS/IPS]. In this research we evaluate the most famous & expensive detection and prevention [IDS/IPS] systems for detecting all types of ARP spoofing attacks and introduce an algorithm which can be implemented in IDS/IPS systems to enhance it's security.

Original languageEnglish
Title of host publicationProceedings of the 2009 International Conference on the Current Trends in Information Technology, CTIT 2009
Pages225-230
Number of pages6
DOIs
Publication statusPublished - 2009
Event2009 International Conference on the Current Trends in Information Technology, CTIT 2009 - Dubai, United Arab Emirates
Duration: Dec 15 2009Dec 16 2009

Publication series

NameProceedings of the 2009 International Conference on the Current Trends in Information Technology, CTIT 2009

Other

Other2009 International Conference on the Current Trends in Information Technology, CTIT 2009
Country/TerritoryUnited Arab Emirates
CityDubai
Period12/15/0912/16/09

ASJC Scopus subject areas

  • General Computer Science
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks'. Together they form a unique fingerprint.

Cite this