We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

A Proposed Technique to Prevent ARP spoofing in Local Area Networks

by Mohamad Fakher Karzon, Mohammad Samir Modabbes
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 175 - Number 32
Year of Publication: 2020
Authors: Mohamad Fakher Karzon, Mohammad Samir Modabbes
10.5120/ijca2020920870

Mohamad Fakher Karzon, Mohammad Samir Modabbes . A Proposed Technique to Prevent ARP spoofing in Local Area Networks. International Journal of Computer Applications. 175, 32 ( Nov 2020), 20-27. DOI=10.5120/ijca2020920870

@article{ 10.5120/ijca2020920870,
author = { Mohamad Fakher Karzon, Mohammad Samir Modabbes },
title = { A Proposed Technique to Prevent ARP spoofing in Local Area Networks },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2020 },
volume = { 175 },
number = { 32 },
month = { Nov },
year = { 2020 },
issn = { 0975-8887 },
pages = { 20-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume175/number32/31656-2020920870/ },
doi = { 10.5120/ijca2020920870 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:40:04.614594+05:30
%A Mohamad Fakher Karzon
%A Mohammad Samir Modabbes
%T A Proposed Technique to Prevent ARP spoofing in Local Area Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 175
%N 32
%P 20-27
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Address Resolution Protocol (ARP) is a network protocol used to identify MAC address through mapping IP. When exchanging information between two computers on a Local Area Network LAN, the source computer must obtain the physical address (MAC) that is mapped to the logical address (IP) of the destination computer, where this process is the basic role of Address Resolution Protocol (ARP) as defined in (RFC826) by Internet Engineering Task Force (IETF). But the nature of this protocol makes it vulnerable to some threats that allow any host on the LAN to have access to unauthorized information or cause the service to stop. In this paper, we present a technique that prevents ARP spoofing attack using a computer application (Server - Client). The application utilizes the static feature of the ARP protocol to build a trusted ARP table that contains correct IP-MAC mapping for each computer on the local area network subnet, then the trusted ARP table is sent to all computers on the subnet. To evaluate the performance of proposed technique, a simulation was implemented using GNS and Virtual Box, where the results showed the efficiency of the proposed technique in terms of attack prevention, and in terms of time, cost and scalability compared to other related studies

References
  1. Rajwinder Kaur, Er. Gurjot Singh, Suman Khurana, 2015, “A Security Approach to Prevent ARP Poisoning and Defensive tools”, International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (3), 431-437, ISSN: 2312-7694.
  2. M. Anathi , K. Vijayakumar , 2020, “An Intelligent Approach For Dynamic Network Traffic Restriction Using MAC Address Verification”, Published by Elsevier B.V. Computer Communications 154, 559–564.
  3. J. Lach, 2003,” Sniffing local network and its detecting”, Studia Infor-matica, Vol.2, No.24, pp. 289-296.
  4. Yang Liu, Kaikun Dong, Lan Dong, Bin Li, 2008,” Research of the ARP Spoofing Principle and a Defensive Algorithm”, Wseas Transactions On Communications, Issue 5, Volume 7, May 2008, ISSN: 1109-2742.
  5. Samvedi A, Owlak S, Chaurasia V. 2014, “Improved secure address resolution protocol”, fifth international conference of communications security and information assurance.
  6. Abdel Salam AM, Elkilani WS, Amin KM, 2014, “An automated approach for preventing ARP spoofing attack using static ARP entries”, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1.
  7. Raval N, Chaudhary P, 2016, “Detection and prevention of ARP poisoning attacks based on scripts”, Int J Adv Res Innovat Ideas Educ-ISSN(O)-2395-4396;2(3):367–374.
  8. Sherin Hijazi, Mohammad S. Obaidat, December 2018, “Address resolution protocol spoofing attacks and security approaches: A survey”, John Wiley & Sons, Ltd.
  9. Md. Ataullah, Naveen Chauhan, 2012, “An Efficient and Secure Solution for the Problems of ARP Cache Poisoning Attacks”, World Academy of Science, Engineering and Technology, International Journal of Information and Communication Engineering, Vol:6, No:8.
  10. Younes O, 2017, “Modeling and performance analysis of a new secure address resolution protocol”, Wiley Int J Commun Syst;31(1): e 3433. https://doi.org/10.1002/ dac.3433.
  11. D. Francis Xavier Christopher and C. Divya, 2020, “Address Resolution Protocol Based Attacks: Prevention and Detection Schemes”, Springer Nature Switzerland AG 2020 A. P. Pandian et al. (Eds.): ICCBI 2018, LNDECT 31, pp. 247–256, https://doi.org/10.1007/978-3-030-24643-3_30.
  12. Conti, M., Dragoni, N., Lesyk, V, 2016, “A survey of man in the middle attacks”, IEEE Commun. Surv. Tutor. 18(3), 2027–2051.
  13. Trabelsi, Z., El-Hajj, W, 2010, “On investigating ARP spoofing security solutions”, Int. J. Internet Protoc. Technol. 5(1–2), 92–100.
  14. Singh, J., Kaur, G., Malhotra, J, 2015, “A comprehensive survey of current trends and challenges to mitigate ARP attacks”, In: Proceedings of the International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), pp. 1–6. IEEE.
  15. Sudhakar and Aggarwal, R. K, 2017 “A Security Approach and Prevention Technique against ARP Poisoning", Information and Communication Technology for Intelligent Systems (ICTIS) - Volume 1, Springer International Publishing.
  16. Arslan, Yuksel, 2017, “A solution for ARP spoofing: Layer-2 MAC and protocol filtering and ARP server”, Research gate.
  17. D. R. Rupal, D. Satasiya, H. Kumar and A. Agrawal, 2016, "Detection and prevention of ARP poisoning in dynamic IP configuration", IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bangalore, pp. 1240-1244.
  18. Dr. S. G. Bhirud and Vijay Katkar, 2011, "Light Weight Approach for IP-ARP Spoofing Detection and Prevention”, Second Asian Himalayas International Conference on Internet (AH-ICI), page(s):1-5.
  19. Boughrara, A.; Mammar, S, 2012, "Implementation of a SNORT's Output Plug-in in Reaction to ARP Spoofing's Attack", 6th International Conference on Sciences of Electronics Technologies of Information and Telecommunications (SETIT), pp.643,647.
  20. Younes, O.S, 2017, “Securing ARP and DHCP for Mitigating Link Layer Attacks”, Sādhanā 42(12),2041–2053.
  21. Moon, D., Lee, J.D., Jeong, Y.S., Park, J.H, 2016, “RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks”. J. Supercomput. 72(5), 1740–1756.
Index Terms

Computer Science
Information Sciences

Keywords

Network security MITM DoS ARP Spoofing Local Area Network