Research of the ARP spoofing principle and a defensive algorithm

  • Authors:
  • Yang Liu;Kaikun Dong;Lan Dong;Bin Li

  • Affiliations:
  • Department of Computer Science & Technology, Harbin Institute of Technology at Weihai, Weihai, Shandong, P.R. China;Department of Computer Science & Technology, Harbin Institute of Technology at Weihai, Weihai, Shandong, P.R. China;Department of Computer Science & Technology, Harbin Institute of Technology at Weihai, Weihai, Shandong, P.R. China;Department of Computer Science & Technology, Harbin Institute of Technology at Weihai, Weihai, P.R. China

  • Venue:
  • WSEAS TRANSACTIONS on COMMUNICATIONS
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

During the network communication process, attacker carry on ARP spoofing by using the disadvantage of the ARP(Address Resolution Protocol) protocol, this phenomenon is seriously threaten the LAN security. This paper will introduce the commonly used ARP spoofing methods such as internal/external network sniffing, interception, malicious attack and so on. It presents the Matching IP method, Data monitor method, Echo time method, ARP response analysis method, software tools detecting method as well as the new method of ARP cache updating, using switching equipment to control and other strategy and presents the algorithm to keep ARP spoofing away and maintain network security.