ASD: ARP Spoofing Detector Using OpenWrt
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeong, Yeonseon | - |
dc.contributor.author | Kim, Hyunghoon | - |
dc.contributor.author | Jo, Hyo Jin | - |
dc.date.accessioned | 2023-01-02T04:40:03Z | - |
dc.date.available | 2023-01-02T04:40:03Z | - |
dc.date.created | 2023-01-02 | - |
dc.date.issued | 2022-03 | - |
dc.identifier.issn | 1939-0114 | - |
dc.identifier.uri | http://scholarworks.bwise.kr/ssu/handle/2018.sw.ssu/42976 | - |
dc.description.abstract | The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP spoofing initially without returning false-positive alarms is important. In general, however, existing works for ARP spoofing are unable to distinguish between ARP spoofing and connections from virtual machine (VM) guests, which results in false-positive alarms. In this article, we propose an access point-based ARP Spoofing Detector (ASD) that can detect ARP spoofing attacks without returning a false-positive rate. Our proposed system distinguishes between ARP spoofing and connections from VM guests using three information tables, AssocList, ARP cache table, and DHCP table, which are commonly managed by the access point based on a Linux system. We evaluated the performance of ASD on ARP spoofing attack experiments. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | WILEY-HINDAWI | - |
dc.relation.isPartOf | SECURITY AND COMMUNICATION NETWORKS | - |
dc.title | ASD: ARP Spoofing Detector Using OpenWrt | - |
dc.type | Article | - |
dc.identifier.doi | 10.1155/2022/2196998 | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | SECURITY AND COMMUNICATION NETWORKS, v.2022 | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000815063800002 | - |
dc.identifier.scopusid | 2-s2.0-85128384548 | - |
dc.citation.title | SECURITY AND COMMUNICATION NETWORKS | - |
dc.citation.volume | 2022 | - |
dc.contributor.affiliatedAuthor | Jo, Hyo Jin | - |
dc.identifier.url | https://www.hindawi.com/journals/scn/2022/2196998/ | - |
dc.type.docType | Article | - |
dc.description.isOpenAccess | Y | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Soongsil University Library 369 Sangdo-Ro, Dongjak-Gu, Seoul, Korea (06978)02-820-0733
COPYRIGHT ⓒ SOONGSIL UNIVERSITY, ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.