Due to increasing network threats, it has become imperative to build a system that is meant to protect the network primarily from intrusion. A discipline that is most oblivious is the layer two of the OSI, which opens the network to dangerous assaults and compromises. Nowadays there are various sophisticated offensive tools and technologies that can exploit these vulnerabilities to create havoc in the tech-savvy generation. ARP spoofing assault is among the most hazardous procedures in local discipline networks. This paper discusses poisoning of Address resolution protocol and the most advanced schemes which mitigate such attacks. This attack has been carried out under test environment for illustrations and various preventive methods against it have been tested and compared. This paper has highlighted in the end an ideal strategy to combat ARP attacks at a superior level than the already existing techniques.
목차
Abstract 1. Introduction 2. ARP Cache Poisoning 2.1. Man-in-the-Middle Attacks 2.2. DoS attacks 2.3. Hijacking 2.4. Cloning 3. Current Counter Measures 4. Current Trends and Challenges 5. Assault and Apt Defense Mechanism 6. Open Issues and Future Directions 7. Conclusion References
키워드
Address Resolution ProtocolMedia Access LayerARP poisoningMAC spoofingMan in the MiddleSpoofing mitigation
저자
Goldendeep Kaur [ CSE Department, Guru Nanak Dev University, Regional Campus, Jalandhar ]
Dr. Jyoteesh Malhotra [ ECE Department, Guru Nanak Dev University, Regional Campus, Jalandhar ]
보안공학연구지원센터(IJFGCN) [Science & Engineering Research Support Center, Republic of Korea(IJFGCN)]
설립연도
2006
분야
공학>컴퓨터학
소개
1. 보안공학에 대한 각종 조사 및 연구
2. 보안공학에 대한 응용기술 연구 및 발표
3. 보안공학에 관한 각종 학술 발표회 및 전시회 개최
4. 보안공학 기술의 상호 협조 및 정보교환
5. 보안공학에 관한 표준화 사업 및 규격의 제정
6. 보안공학에 관한 산학연 협동의 증진
7. 국제적 학술 교류 및 기술 협력
8. 보안공학에 관한 논문지 발간
9. 기타 본 회 목적 달성에 필요한 사업
간행물
간행물명
International Journal of Future Generation Communication and Networking
간기
격월간
pISSN
2233-7857
수록기간
2008~2016
십진분류
KDC 505DDC 605
이 권호 내 다른 논문 / International Journal of Future Generation Communication and Networking Vol.8 No.2