...
首页> 外文期刊>International journal of advanced intelligence paradigms >A framework to mitigate ARP sniffing attacks by cache poisoning
【24h】

A framework to mitigate ARP sniffing attacks by cache poisoning

机译:通过缓存中毒缓解ARP嗅探攻击的框架

获取原文
获取原文并翻译 | 示例
           

摘要

>Today in the digital era of computing, most of the network attacks are caused by sniffing the sensitive data over the network. Among various types of sniffing attacks, ARP sniffing causes most of the LAN attacks (wired and wireless LAN coexist). ARP sniffing causes poisoning of ARP cache or spoofing. Through ARP sniffing, the attacker tries to know the (IP, MAC) pair of victim's system available in ARP table or ARP request-reply packet passed over the network and either exploits victim's resources or creates a situation to deny victim's services for its legitimate users. This in-turn causes MITM, DoS or DDoS attacks. The major cause for these attacks is lack of effective authentication mechanisms with ARP or RARP protocols used for address resolution. This paper provides the working principle of ARP protocol and a method to mitigate the attacks caused by ARP cache poisoning. The proposed framework compares the IP-MAC pair in the ARP and Ethernet headers and if any fake entry is suspected, the information is updated in the fake list and a message is sent to the gateway or router to alert it from cache poisoning attacks.
机译:>如今,在数字化计算时代,大多数网络攻击是由通过网络嗅探敏感数据引起的。在各种类型的嗅探攻击中,ARP嗅探会导致大多数LAN攻击(有线和无线LAN并存)。 ARP嗅探会导致ARP缓存中毒或欺骗。通过ARP嗅探,攻击者试图通过网络传递的ARP表或ARP请求-应答数据包中了解受害者系统的(IP,MAC)对,并利用受害者的资源或制造一种情况来拒绝受害者为其合法用户提供的服务。这又会导致MITM,DoS或DDoS攻击。这些攻击的主要原因是缺乏用于地址解析的ARP或RARP协议的有效身份验证机制。本文提供了ARP协议的工作原理以及减轻ARP缓存中毒造成的攻击的方法。提议的框架将ARP和以太网报头中的IP-MAC对进行比较,如果怀疑有任何虚假条目,则在虚假列表中更新信息,并向网关或路由器发送一条消息,以警告其免受缓存中毒攻击。 / p>

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号