Design of ARP Intrusion Detection System

Article Preview

Abstract:

According to the rapid development of information technology and network flow, ARP intrusion attack from internet is more and more popular, which damages a lot to normal working, especially in some high security demand fields. Therefore, this paper analyzes the principle of ARP intrusion attack, designed the data collect and analyze module of networks, and then developed an ARP intrusion detection system. It shows this system can detect the ARP intrusion correctly and find where the attack occurs.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

326-330

Citation:

Online since:

July 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Coates AO, Hero III, R Nowak. Internet Tomography [J]. IEEE Signal Processing Magazine. 2002, 19(3). P47-65.

DOI: 10.1109/79.998081

Google Scholar

[2] Leopoldo Angrisani, Claudio Narduzzi. Measurements for Networking: An Overview I2MTC 2008. IEEE International Instrumentation and Measurement Technology Conference Victoria, Vancouver Island, Canada. 2008, 5. P12-15.

DOI: 10.1109/imtc.2008.4547248

Google Scholar

[3] David C. Plummer (1982-11). RFC 826, An Ethernet Address Resolution Protocol - or - Converting Network Protocol Addresses to 48. bit Ethernet Address for Transmission on Ethernet Hardware,. Internet Engineering Task Force, Network Working Group.

DOI: 10.17487/rfc0826

Google Scholar

[4] Miller, Brad. L. and Michael J. Shaw. 1996. Genetic Algorithms with Dynamic Niche Sharing for Multimodal Function Optimization., In Proceedings of IEEE International Conf. on Evolutionary Computation, pp.786-791. Nagoya University, Japan.

DOI: 10.1109/icec.1996.542701

Google Scholar

[5] Paxson, Vern. 1998. Bro: A System for Detecting Network Intruders in Real time., In Proceedings of 7th USENIX Security Symposium, pp.31-51. San Antonio, Texas.

Google Scholar