IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs
View Sample PDF
Author(s): Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK) and Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia)
Copyright: 2011
Volume: 3
Issue: 3
Pages: 11
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Wei Qi Yan (Auckland University of Technology, New Zealand)
DOI: 10.4018/jdcf.2011070104

Purchase


Abstract

This paper describes two novel methods for active detection and prevention of ARP-poisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types of attacks. MitM attacks are particularly dangerous, because they allow an attacker to monitor network traffic and break the integrity of data being sent over the network. The authors introduce backwards compatible techniques to prevent ARP poisoning and deal with sophisticated stealth MitM programs.

Related Content

Trust Evaluation Strategy for Single Sign-on Solution in Cloud
Guangxuan Chen, Liping Ding, Jin Du, Guomin Zhou, Panke Qin, Guangxiao Chen, Qiang Liu. © 2018. 11 pages.
View Details View Details PDF Full Text View Sample PDF
Reliable Security Strategy for Message-Oriented Middleware
Guangxuan Chen, Liping Ding, Guangxiao Chen, Panke Qin. © 2018. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Random Grid and Reversible Watermarking-Based On Verifiable Secret Sharing for Outsourcing Images in Cloud
Hang Gao, Mengting Hu, Tiegang Gao, Renhong Cheng. © 2018. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Secure Steganography in JPEG Images Based on Histogram Modification and Hyper Chaotic System
Shun Zhang, Liang Yang, Xihao Xu, Tiegang Gao. © 2018. 14 pages.
View Details View Details PDF Full Text View Sample PDF
Geometrically Invariant Image Watermarking Using Histogram Adjustment
Zhuoqian Liang, Bingwen Feng, Xuba Xu, Xiaotian Wu, Tao Yang. © 2018. 13 pages.
View Details View Details PDF Full Text View Sample PDF
A Perceptual Encryption Scheme for HEVC Video with Lossless Compression
Juan Chen, Fei Peng. © 2018. 12 pages.
View Details View Details PDF Full Text View Sample PDF
CVSS: A Cloud-Based Visual Surveillance System
Lei Zhou, Wei Qi Yan, Yun Shu, Jian Yu. © 2018. 13 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom