IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs
View Sample PDF
Author(s): Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK) and Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia)
Copyright: 2011
Volume: 3
Issue: 3
Pages: 11
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Wei Qi Yan (Auckland University of Technology, New Zealand)
DOI: 10.4018/jdcf.2011070104

Purchase


Abstract

This paper describes two novel methods for active detection and prevention of ARP-poisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types of attacks. MitM attacks are particularly dangerous, because they allow an attacker to monitor network traffic and break the integrity of data being sent over the network. The authors introduce backwards compatible techniques to prevent ARP poisoning and deal with sophisticated stealth MitM programs.

Related Content

Age Detection Through Keystroke Dynamics from User Authentication Failures
Ioannis Tsimperidis, Shahin Rostami, Vasilios Katos. © 2017. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Investigation Approach for Network Attack Intention Recognition
Abdulghani Ali Ahmed. © 2017. 22 pages.
View Details View Details PDF Full Text View Sample PDF
A Framework of Event-Driven Traffic Ticketing System
Jia Wang, Minh Ngueyn, Weiqi Yan. © 2017. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Dynamic Semi-Group CIA Pattern Optimizing the Risk on RTS
Padma Lochan Pradhan. © 2017. 20 pages.
View Details View Details PDF Full Text View Sample PDF
Proposed Round Robin CIA Pattern on RTS for Risk Assessment
Padma Lochan Pradhan. © 2017. 15 pages.
View Details View Details PDF Full Text View Sample PDF
Speech Content Authentication Scheme based on High-Capacity Watermark Embedding
Fang Sun, Zhenghui Liu, Chuanda Qi. © 2017. 14 pages.
View Details View Details PDF Full Text View Sample PDF
Deception Detection by Hybrid-Pair Wireless fNIRS System
Hong Di, Xin Zhang. © 2017. 10 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom