Design of Network Security Monitoring System with Mechanical Properties Suitable for LAN Based on ARP Deception

Article Preview

Abstract:

In the network security monitoring system, it is important to trace information source timely and accurately, which is an important way to investigate and collect evidence. But because of public network’s IP limited resources, LAN hosts usually share the public network’s IP resources by NAT way, and conceal internal network structure, which make the network security monitoring system unable to locate the real effective sensitive information source in LAN. Based on the study of WINPCAP network sniffing technology and the ARP deception protocol in exchange network environment, a network security monitoring system with mechanical properties suitable for LAN environment is designed and realized, which locate information source accurately through filtering and matching the sensitive information transmitting in LAN by setting the capture factors as key words of document, web site shared by FTP, QQ number etc.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

319-322

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Rosenberg J, Schulzrinne H, Camarillo G, et al. in: Session Initiation Protocol (2002).

Google Scholar

[2] Yun-Shuai Yu, Ce-Kuen Shieh, et al. in: An efficient NAT traversal for SIP and its associated media sessions (2004).

Google Scholar

[3] The WinPcap 4. 0. 1 manual on http: /www. coffeecat. net. cn/WinPcap/html/index. html.

Google Scholar

[4] Trabelsi. Z, El-Hajj and W. Preventing, in: ARP Attacks Using a Fuzzy-Based Stateful ARP Cache, ICC'07. IEEE International Conference (2007), pp.1355-1360.

DOI: 10.1109/icc.2007.228

Google Scholar

[5] Douglas E. Comer, in: Internet Working with TCP/IP, Prentice Hall (2004).

Google Scholar

[6] Windows HTTP Services Reference Material on http: /nmv884rp. iteye. com/blog/1347703.

Google Scholar