首页> 外文会议>Annual Computer Security Applications Conference >A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning
【24h】

A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning

机译:一种中间件的异步和向后兼容检测和预防ARP缓存中毒的方法

获取原文
获取外文期刊封面目录资料

摘要

Discusses the Address Resolution Protocol (ARP) and the problem of ARP cache poisoning. ARP cache poisoning is the malicious act, by a host in a LAN, of introducing a spurious IP address to MAC (Ethernet) address mapping in another host's ARP cache. We discuss design constraints for a solution: the solution needs to be implemented in middleware, without any access or change to any operating system source code, it needs to be backward-compatible with the existing protocol and to be asynchronous. We present our solution and implementation aspects of it in a Streams-based networking subsystem. Our solution comprises two parts: a "bump in the stack" Streams module, and a separate Stream with a driver and user-level application. We also present the algorithm that is executed in the module and application to prevent ARP cache poisoning where possible, and to detect and raise alarms otherwise. We then discuss some limitations with our approach and present some preliminary performance figures for our implementation.
机译:讨论地址解析协议(ARP)和ARP缓存中毒问题。 ARP缓存中毒是由LAN中的主机在另一个主机ARP缓存中引入MAC(以太网)地址映射的恶意行为。我们讨论解决方案的设计约束:解决方案需要在中间件中实现,无需任何访问或更改任何操作系统源代码,它需要与现有协议保持向后兼容并异步兼容。我们在基于流的网络子系统中提供了它的解决方案和实现方面。我们的解决方案包括两个部分:“堆栈中的凹凸”流模块,以及具有驱动程序和用户级应用程序的单独流。我们还介绍了在模块中执行的算法和应用程序,以防止ARP缓存中毒在可能的情况下,并否则检测和提高警报。然后,我们与我们的方法讨论了一些局限性,并为我们的实施提供了一些初步性能数据。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号