首页> 外文会议>International Conference on Sciences of Electronics, Technologies of Information and Telecommunications >Implementation of a SNORT's output Plug-In in reaction to ARP Spoofing's attack
【24h】

Implementation of a SNORT's output Plug-In in reaction to ARP Spoofing's attack

机译:响应ARP欺骗的攻击,实现SNORT的输出插件

获取原文

摘要

The attacks that exploit the Address Resolution Protocol (ARP) are considered as the most dangerous for the security of networks. Indeed, this attack poisons the cache ARP of the machine and makes possible all the actions of Man In the Middle (reading, modification, denial-of-service). For this, it becomes very important to prevent against this type of attack, by setting up systems able to detect it, known as Intrusion Detection Systems, and to react consequently. Among the existing IDS, we find SNORT which is the most used; but its reactions are generally in a passive way (Log, sending message …). In this paper, we propose an approach by introducing a Plug-In making SNORT react against ARPSpoofing's attack in real-time.
机译:利用地址解析协议(ARP)的攻击被视为对网络安全最危险的攻击。确实,此攻击使机器的缓存ARP失效,并使“中间人”的所有操作(读取,修改,拒绝服务)成为可能。为此,通过设置能够检测到这种攻击的系统(称为入侵检测系统)并做出反应来防止这种类型的攻击变得非常重要。在现有的IDS中,我们发现SNORT是最常用的。但是它的反应通常是被动的(日志,发送消息...)。在本文中,我们通过引入一个插件使SNORT对ARPSpoofing的攻击做出实时反应来提出一种方法。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号