CFP last date
20 January 2025
Reseach Article

A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks

by Jaideep Singh, Vinit Grewal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 116 - Number 11
Year of Publication: 2015
Authors: Jaideep Singh, Vinit Grewal
10.5120/20381-2628

Jaideep Singh, Vinit Grewal . A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks. International Journal of Computer Applications. 116, 11 ( April 2015), 25-28. DOI=10.5120/20381-2628

@article{ 10.5120/20381-2628,
author = { Jaideep Singh, Vinit Grewal },
title = { A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 116 },
number = { 11 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 25-28 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume116/number11/20381-2628/ },
doi = { 10.5120/20381-2628 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:56:50.708142+05:30
%A Jaideep Singh
%A Vinit Grewal
%T A Survey of Different Strategies to Pacify ARP Poisoning Attacks in Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 116
%N 11
%P 25-28
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper discusses poisoning of Address resolution protocol and the most advanced schemes which help to mitigate such exploits. The attack has been illustrated under different environments. The various detection and mitigative methods have been tested and compared on the basis of important network parameters.

References
  1. Marco Antônio Carnut and João J. C. Gondim, "ARP spoofing detection on switched ethernet networks: a feasibility study," 5th Symposium on Security in Informatics held at Brazilian Air Force Technology Institute, November 2003
  2. Moxie Marlinspike, "SSLStrip, Black Hat DC 2009", Retrievedhttp://www. thoughtcrime. org/software/sslstrip/
  3. D. Plummer. An ethernet address resolution protocol, Nov. 2010. RFC 826.
  4. Cisco Systems. Configuring Dynamic ARP Inspection,chapter 39, pages 39:1–39:22. 2012. Catalyst 6500 Series Switch Cisco IOS Sofware Configuration Guide, Release 12. 2SX
  5. T. Demuth and A. Leitner. ARP spoofing and poisoning:Traffic tricks. Linux Magazine, 56:26–31, July 2011.
  6. Jaideep Singh, Goldendeep Kaur, Dr. Jyoteesh Malhotra, "A Comprehensive Survey of Current Trends and Challenges to mitigate ARP attacks", In Proceedings of 1st International Conference on Electrical, Electronics, Signals and Optimization , ISBN: 978-1-4799-7678 2/15/$31. 00 ©2015 IEEE
  7. Neminath H, S Biswas, S Roopa, R Ratti, R Nandi, F A Barbhuiya, A Sur, V Ramachandran, "A DES Approach to Intrusion Detection System foe ARP Spoofing Attacks", 18th Mediterranean Conference on Control& Automation (MED), ISBN: 978-1-4244-8091-3, IEEE 2010
  8. Wenjian Xing, Yunlan Zhao, Tonglei Li, "Research on the defense against ARP Spoofing Attacks based on Winpcap", 2010 Second International Workshop on Education Technology and Computer Science, Digital Object Identifier: 1O. l109IETCS. 201O. 75, 2010 IEEE
  9. M. Carnut and J. Gondim. ARP spoofing detection onswitched Ethernet networks: A feasibility study. In Proceedingsof the 5th Simp´osioSeguranc¸aemInform´atica, Nov. 2011.
  10. SY Nam, D Kim, J Kim, Enhanced ARP: preventing ARP poisoning-basedman-in-the-middle attacks. IEEE Commun Lett. 14(2), 187–189 (2010).
  11. V. Goyal and V. Abraham " An efficient Solution to the ARP cache poisoning problem", in Proceedings of 10th Australasian Conference on Information Security and Privacy, Jul 2013, pp 40-51.
  12. Divya Sharma, Oves Khan, Kanika Aggarwal, Preeti Vaidya, "A New Approach to Prevent ARP Spoofing", In Proceedings of International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-3, Issue-1, June 2013.
  13. Hodges, C. Jackson, A. Barth, HTTP Strict Transport Security(HSTS), IETF, Internet draft, 2012.
  14. S. Whalen, "An introduction to ARP spoofing," 2600: The HackerQuarterly, vol. 18, no. 3, Fall 2001,. Available:http://servv89pn0aj. sn. sourcedns. com/_gbpprorg/2600/arp spoofing intro. pdf
  15. A. Fung, K. Chueng, "SSLock: Sustaining the Trust on Entities brought by SSL, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, Beijing, China, 2010.
  16. ChristophP. Mayer, "Advanced ARP Detection: XArp", Retrievedfrom: http://www. securityfocus. com/tools/6908.
Index Terms

Computer Science
Information Sciences

Keywords

Wireless Networks Cyber Security Address Resolution Protocol ARP poisoning Promiscuous mode MAC spoofing Man in the Middle Mitigation.