Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

ASD: ARP Spoofing Detector Using OpenWrtopen access

Authors
Jeong, YeonseonKim, HyunghoonJo, Hyo Jin
Issue Date
Mar-2022
Publisher
WILEY-HINDAWI
Citation
SECURITY AND COMMUNICATION NETWORKS, v.2022
Journal Title
SECURITY AND COMMUNICATION NETWORKS
Volume
2022
URI
http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/42976
DOI
10.1155/2022/2196998
ISSN
1939-0114
Abstract
The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP spoofing initially without returning false-positive alarms is important. In general, however, existing works for ARP spoofing are unable to distinguish between ARP spoofing and connections from virtual machine (VM) guests, which results in false-positive alarms. In this article, we propose an access point-based ARP Spoofing Detector (ASD) that can detect ARP spoofing attacks without returning a false-positive rate. Our proposed system distinguishes between ARP spoofing and connections from VM guests using three information tables, AssocList, ARP cache table, and DHCP table, which are commonly managed by the access point based on a Linux system. We evaluated the performance of ASD on ARP spoofing attack experiments.
Files in This Item
Go to Link
Appears in
Collections
College of Information Technology > School of Software > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE