Skip to main content

An Active Host-Based Detection Mechanism for ARP-Related Attacks

  • Conference paper
Advances in Networks and Communications (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 132))

Abstract

Most of the LAN based-attacks involves the spoofing of the victim host with falsified IP-MAC pairs. MAC Spoofing is possible because of the stateless nature of the Address Resolution Protocol (ARP), which is responsible for resolving IP Addresses to MAC Addresses. Several mechanisms have been proposed to detect and mitigate ARP spoofing attempts both at the network level and at the host level, but each of them have their own drawback. In this paper we propose a Host-based Intrusion Detection system for LAN attacks which work without any extra constraint like static IP-MAC, modifying ARP etc. The scheme is successfully validated in a test bed with various attack scenarios and the results show the effectiveness of the proposed technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Held, G.: Ethernet Networks: Design, Implementation, Operation, Management, 1st edn. John Wiley & Sons, Ltd., Chichester (2003)

    MATH  Google Scholar 

  2. Hubballi, N., Roopa, S., Ratti, R., Barburiya, F., Biswas, S., Nandi, S., Sur, A., Ramachandran, V.: An active intrusion detection system for lan specific attacks. In: The 4th International Conference on Information Security and Assurance (2010) (in press)

    Google Scholar 

  3. Kozierok, C.M.: TCP/IP Guide, 1st edn. No Starch Press (October 2005)

    Google Scholar 

  4. Tripunitara, M.V., Dutta, P.: A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning. In: Proceedings of the 15th Annual Computer Security Applications Conference, ACSAC 1999, Washington, DC, USA, p. 303. IEEE Computer Society, Los Alamitos (1999)

    Google Scholar 

  5. Zhenqi Wang, Y.Z.: Monitoring arp attack using responding time and state arp cache. In: The Sixth International Symposium on Neural Networks (ISNN 2009), pp. 701–709 (2009)

    Google Scholar 

  6. Gouda, M.G., Huang, C.T.: A secure address resolution protocol. Comput. Networks 41(1), 57–71 (2003)

    Article  MATH  Google Scholar 

  7. Lootah, W., Enck, W., McDaniel, P.: Tarp: Ticket-based address resolution protocol, pp. 106–116. IEEE Computer Society, Los Alamitos (2005)

    Google Scholar 

  8. Zhao, S.L.: Weight intrusion detection, http://www.snort.org

  9. Abad, C.L., Bonilla, R.I.: An analysis on the schemes for detecting and preventing arp cache poisoning attacks. In: Proceedings of the 27th International Conference on Distributed Computing Systems Workshops, ICDCSW 2007, Washington, DC, USA, pp. 60–67. IEEE Computer Society, Los Alamitos (2007)

    Google Scholar 

  10. arpwatch, http://www.arpalert.org

  11. arpguard, https://www.arp-guard.com

  12. xarp, http://www.chrismc.de/

  13. Ramachandran, V., Nandi, S.: Detecting arp spoofing: An active technique. In: Jajodia, S., Mazumdar, C. (eds.) ICISS 2005. LNCS, vol. 3803, pp. 239–250. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  14. Whalen, S.: An Introduction to ARP Spoofing (April 2001)

    Google Scholar 

  15. Sisaat, K., Miyamoto, D.: Source address validation support for network forensics. In: Yoshiura, H., Sakurai, K., Rannenberg, K., Murayama, Y., Kawamura, S.-i. (eds.) IWSEC 2006. LNCS, vol. 4266, pp. 387–401. Springer, Heidelberg (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Barbhuiya, F.A. et al. (2011). An Active Host-Based Detection Mechanism for ARP-Related Attacks. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advances in Networks and Communications. CCSIT 2011. Communications in Computer and Information Science, vol 132. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17878-8_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17878-8_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17877-1

  • Online ISBN: 978-3-642-17878-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics