IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs
View Sample PDF
Author(s): Kenan Kalajdzic (Center for Computing Education, Bosnia and Herzegovina), Ahmed Patel (Universiti Kebangsaan Malaysia, Malaysia and Kingston University, UK) and Mona Taghavi (Universiti Kebangsaan Malaysia, Malaysia)
Copyright: 2011
Volume: 3
Issue: 3
Pages: 11
Source title: International Journal of Digital Crime and Forensics (IJDCF)
Editor(s)-in-Chief: Wei Qi Yan (Auckland University of Technology, New Zealand) and Feng Liu (Chinese Academy of Sciences, China)
DOI: 10.4018/jdcf.2011070104

Purchase


Abstract

This paper describes two novel methods for active detection and prevention of ARP-poisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types of attacks. MitM attacks are particularly dangerous, because they allow an attacker to monitor network traffic and break the integrity of data being sent over the network. The authors introduce backwards compatible techniques to prevent ARP poisoning and deal with sophisticated stealth MitM programs.

Related Content

General Construction for Extended Visual Cryptography Scheme Using QR Codes
Yuqiao Cheng, Zhengxin Fu, Bin Yu, Gang Shen. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
A Universal Image Forensics of Smoothing Filtering
Anjie Peng, Gao Yu, Yadong Wu, Qiong Zhang, Xiangui Kang. © 2019. 11 pages.
View Details View Details PDF Full Text View Sample PDF
Reversible Watermarking on Stereo Audio Signals by Exploring Inter-Channel Correlation
Yuanxin Wu, Wen Diao, Dongdong Hou, Weiming Zhang. © 2019. 17 pages.
View Details View Details PDF Full Text View Sample PDF
Reversible Data Hiding with Multiple Data for Multiple Users in an Encrypted Image
Asad Malik, Hongxia Wang, Hanzhou Wu, Sani M. Abdullahi. © 2019. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Detecting and Distinguishing Adaptive and Non-Adaptive Steganography by Image Segmentation
Jie Zhu, Xianfeng Zhao, Qingxiao Guan. © 2019. 16 pages.
View Details View Details PDF Full Text View Sample PDF
Image Steganalysis in High-Dimensional Feature Spaces with Proximal Support Vector Machine
Ping Zhong, Mengdi Li, Kai Mu, Juan Wen, Yiming Xue. © 2019. 12 pages.
View Details View Details PDF Full Text View Sample PDF
Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
Zichi Wang, Zhaoxia Yin, Xinpeng Zhang. © 2019. 10 pages.
View Details View Details PDF Full Text View Sample PDF
Body Bottom