CFP last date
20 January 2025
Reseach Article

Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks

by Goldendeep Kaur, Jyoteesh Malhotra
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 121 - Number 13
Year of Publication: 2015
Authors: Goldendeep Kaur, Jyoteesh Malhotra
10.5120/21600-4711

Goldendeep Kaur, Jyoteesh Malhotra . Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks. International Journal of Computer Applications. 121, 13 ( July 2015), 15-19. DOI=10.5120/21600-4711

@article{ 10.5120/21600-4711,
author = { Goldendeep Kaur, Jyoteesh Malhotra },
title = { Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 121 },
number = { 13 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-19 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume121/number13/21600-4711/ },
doi = { 10.5120/21600-4711 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:08:19.803392+05:30
%A Goldendeep Kaur
%A Jyoteesh Malhotra
%T Comparative Investigation of ARP Poisoning Mitigation Techniques using Standard Testbed for Wireless Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 121
%N 13
%P 15-19
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle attacks, denial of service attacks, IP spoofing etc. As a result in addition to the firewalls, password protection techniques, virus detectors etc, additional levels of security is needed to secure the wireless networks. This paper focuses on comparing various techniques that are used to protect the users from these attacks by providing practical observations based on the network parameters time and scalability and also highlighted the best method in the end to combat the attacks at a superior level.

References
  1. "ARP-Guard," (accessed 28-July-2013). [Online]. Available: http://www. arp-guard. com.
  2. B. D. Schuymer, "ebtables: Ethernet bridge/switch tables," Mar. 2006, (accessed 28-July-2013). Available:http://ebtables. sourceforge. net.
  3. D. Plummer. An ethernet address resolution protocol, Nov. 2010. RFC 826.
  4. BackTrack Linuk. http://www. backtrack-linux. org/
  5. The Ettercap Project. http://ettercap. sourceforge. net/
  6. What Is SSL (Secure Sockets Layer) and What Are SSL Certificates? https://www. digicert. com/ssl. htm
  7. Wireshark. https://www. wireshark. org/
  8. L. N. R. Group. arpwatch, the Ethernet monitor program; for keeping track of ethernet/ip address pairings. (Last accessed April 17, 2012).
  9. Moxie Marlinspike, "SSLStrip, Black Hat DC 2009", Retrievedhttp://www. thoughtcrime. org/software/sslstrip.
  10. S. Whalen, "An introduction to ARP spoofing," 2600: The Hacker Quarterly, vol. 18, no. 3, Fall 2001,. Available:http://servv89pn0aj. sn. sourcedns. com/_g bpprorg/ 2600/arp spoofing intro. pdf
  11. T. Demuth and A. Leitner. ARP spoofing and poisoning: Traffic tricks. Linux Magazine, 56:26–31, July 2011.
Index Terms

Computer Science
Information Sciences

Keywords

ARP Cache Snort Wireshark SSLstrip Ettercap.