TY - GEN
T1 - Using a Fuzzy Logic controller to thwart Data Link layer attacks in ethernet networks
AU - El-Hajj, Wassim
AU - Trabelsi, Zouheir
PY - 2007
Y1 - 2007
N2 - Nowadays data networks represent the most common communication environment for transfer of data, voice or image. Such popularity led network users to becoming more vulnerable to network attacks and intrusions. Data link layer attacks, ex. ARP poisoning, is considered to be one of these dangerous attacks. ARP poisoning attack is a technique used to attack an Ethernet network. It may allow an attacker to sniff network traffic or stop the traffic altogether. In this paper, we use a Fuzzy Logic controller to thwart Data Link layer attacks in ethernet networks (ARP poisoning). Each host in the network is assigned certain dynamic characteristics. Then a Fuzzy Logic controller is used to combine these characteristics keeping in mind the synergy between them. The output of the controller decides if the host is trusted or not. Moreover, we use a stateful ARP cache, instead of the traditional stateless ARP cache.
AB - Nowadays data networks represent the most common communication environment for transfer of data, voice or image. Such popularity led network users to becoming more vulnerable to network attacks and intrusions. Data link layer attacks, ex. ARP poisoning, is considered to be one of these dangerous attacks. ARP poisoning attack is a technique used to attack an Ethernet network. It may allow an attacker to sniff network traffic or stop the traffic altogether. In this paper, we use a Fuzzy Logic controller to thwart Data Link layer attacks in ethernet networks (ARP poisoning). Each host in the network is assigned certain dynamic characteristics. Then a Fuzzy Logic controller is used to combine these characteristics keeping in mind the synergy between them. The output of the controller decides if the host is trusted or not. Moreover, we use a stateful ARP cache, instead of the traditional stateless ARP cache.
KW - ARP cache poisoning
KW - Data Link
KW - Denial of Service (DoS)
KW - Fuzzy Logic
KW - Man-in-the-Middle (MiM)
UR - http://www.scopus.com/inward/record.url?scp=36349011506&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=36349011506&partnerID=8YFLogxK
U2 - 10.1109/WCNC.2007.474
DO - 10.1109/WCNC.2007.474
M3 - Conference contribution
AN - SCOPUS:36349011506
SN - 1424406595
SN - 9781424406593
T3 - IEEE Wireless Communications and Networking Conference, WCNC
SP - 2549
EP - 2554
BT - 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
T2 - 2007 IEEE Wireless Communications and Networking Conference, WCNC 2007
Y2 - 11 March 2007 through 15 March 2007
ER -