Design of Defense Algorithm Concerning Arp Attack on Campus Network

Article Preview

Abstract:

Since some security flaws exist in the arp protocol, some network attacks may arise such as arp overflow, arp spoofing and so on. By analyzing the modes of arp attack on campus network, the paper puts forward a defense algorithm against the arp attack. In the algorithm, the arp packets sent and receive by the host computer are to be detected ,and those differing ones are abandoned; In accordance with the policy of “receiving arp response after sending an arp request ”checks the arp response packets, those no-request ones are refused. The above defense algorithm can effectively prevent arp attacks, which can be applied in the campus network with high-safety requirements.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

582-585

Citation:

Online since:

October 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Haiying Li, Hao Cheng , Zhiqiang Lv. Network Design and Implementation of Defense Modes against arp attack[J]. Computer Engineering, 3 (2005):17-1008.

Google Scholar

[2] Wenbing Zheng. Principle of arp Spoofing and a Preventive Algorithm[J]. Journal of Jiangnan University,2003,02 (6):574-577.

Google Scholar

[3] Jun Zhao, KeFei Chen. Security Vulnerabilities Analysis of arp Protocol, and the Defense Methods[J]. Journal of Information Security and Communication Secrecy ,2006,08:72, 74

Google Scholar

[4] Xia Ren, Shuwang Lv. Analysis of arp Spoofing Principle and Defense Methods[J]. Computer Engineering, 2003,29 (9):127-128.

Google Scholar

[5] Honggang Lin, Lin Chen, Biao Wang, Yanwei Wu. An Active Algorithm of Detection and Prevention arp Attack. Journal of Sichuan University 2008,40 (3): 144-148.

Google Scholar

[6] Bruschi, Omaghi, Rosti. S-arp: A secure address resolution protocol[C] //Proceedings.Annual Computer Security Applications Conference.2003, 66-75.

DOI: 10.1109/csac.2003.1254311

Google Scholar

[7] Vipul Goyal, Rohit Tripathy .An efficient solution to the arp cache poisoning problem[C]//10th Australasian Conference on Information Security and Privacy (ACISP.2005).LNCS 3574, Springer-Verlag,2005.

DOI: 10.1007/11506157_4

Google Scholar

[8] Chengxu Ye. Spoofing and Prevention Based on arp Protocol in Campus Network. Journal of Qinghai University, 2007,25 (3): 60-61.

Google Scholar

[9] Xiaofeng Zhao, Jingming Wang, Pingshui Wang. Design and Implementation of Defensive Patterns against arp Spoofing Attack in Campus Network [J]. Journal of Computer Technology and its Development, 2007,17 (7):153-155.

Google Scholar