Comparative Analysis of Neighbor Greeting Procotols ARP Versus ES-IS
SS '96 Proceedings of the 29th Annual Simulation Symposium (SS '96)
S-ARP: a Secure Address Resolution Protocol
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Dynamic access control scheme for service-based multi-netted asymmetric virtual LAN
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
Internet infrastructure security: a taxonomy
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Network survivability nowadays has priority over everything for both network design and implementation. The key focus on the network security is securing individual components as well as preventing unauthorized access to network services. Ironically, Address Resolution Protocol (ARP) poisoning and spoofing techniques can be used to prohibit unauthorized network access and resource occupations. Our work deals with simulation of intrusion traffic by explicitly generating data packets that contain ARP spoofing packets. In this paper we report experimental studies of simulation efficiency and network performance of simulated networks using a host isolation system to capture duplicate ARP spoofing attacks. The Virtual Local Area Network (VLAN) based network access control framework proposed in this paper works in parallel with the policy based real-time access control function to make the utmost use of the network resources and to provide a high-quality service to the user.