DocumentCode :
2477766
Title :
Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt
Author :
Ortega, Andre P. ; Marcos, Xavier E. ; Chiang, Luis D. ; Abad, Cristina L.
Author_Institution :
Fac. de Ing. en Electr. y Comput., Escuela Super. Politec. del Litoral, Guayaquil, Ecuador
fYear :
2009
fDate :
19-21 Oct. 2009
Firstpage :
1
Lastpage :
9
Abstract :
The address resolution protocol (ARP) is used by computers to map network addresses (IP) to physical addresses (MAC). The protocol has proved to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP cache poisoning or ARP spoofing attacks, an intruder can impersonate another host (man-in-the-middle attack) and gain access to sensitive information. Several schemes to mitigate, detect and prevent these attacks have been proposed, but each has its limitations. In this paper we propose a solution to the problem that can be implemented in SOHOs using low-end networking equipment running the OpenWrt firmware. The solution proposed is effective and inexpensive and presents several advantages over other existing prevention methods.
Keywords :
IP networks; access protocols; computer crime; ARP cache poisoning attacks; ARP spoofing attacks; IP address; MAC; OpenWrt; address resolution protocol; malicious hosts; network addresses; Access protocols; Broadcasting; Computer networks; Local area networks; Media Access Protocol; Microprogramming; Network servers; Performance gain; Physics computing; Switches;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Network Operations and Management Symposium, 2009. LANOMS 2009. Latin American
Conference_Location :
Punta del Este
Print_ISBN :
978-1-4244-4551-6
Electronic_ISBN :
978-1-4244-4550-9
Type :
conf
DOI :
10.1109/LANOMS.2009.5338799
Filename :
5338799
Link To Document :
بازگشت