Comparative Investigation of ARP Poisoning Mitigation Techniques Using Standard Testbed for Wireless Networks

Authors

  • Goldendeep Kaur Computer Science and Engineering Department, Guru Nanak Dev University, Regional Campus, Jalandhar
  • Jyoteesh Malhotra Computer Science and Engineering Department, Guru Nanak Dev University, Regional Campus, Jalandhar

DOI:

https://doi.org/10.13052/2245-1439.423

Keywords:

ARP Cache, Snort, Wireshark, SSLstrip, Ettercap

Abstract

Due to the increasing demand of wireless networks, there is an increasing necessity for security as well. This is because unlike wired networks, wireless networks can be easily hacked form outside the building if proper security measures are not in place as wireless networks make use of radio waves and radio waves can leak outside of building at distances up to 300 feet or more. So everything we do on our network can be monitored by anyone who has wireless capabilities. This unauthorized access can be used as an essence by the hacker to launch various kinds of attacks like man-in-the-middle attacks, denial of service attacks, IP spoofing etc. As a result in addition to the firewalls, password protection techniques, virus detectors etc, additional levels of security is needed to secure the wireless networks. This paper focuses on comparing various techniques that are used to protect the users from these attacks by providing practical observations based on the network parameters time and scalability and also highlighted the best method in the end to combat the attacks at a superior level.

 

Downloads

Download data is not yet available.

References

“ARP-Guard,” (accessed 28-July-2013). [Online]. Available: http://www.arp-guard.com.

B. D. Schuymer, “ebtables: Ethernet bridge/switch tables,” Mar. 2006, (accessed 28-July-2013). Available:http://ebtables.sourceforge.net.

D. Plummer. An ethernet address resolution protocol, Nov. 2010. RFC 826.

http://www.backtrack-linux.org/

http://ettercap.sourceforge.net/

https://www.digicert.com/ssl.htm

https://www.wireshark.org/

L. N. R. Group. arpwatch, the Ethernet monitor program; for keeping track of ethernet/ip address pairings. (Last accessed April 17, 2012).

Moxie Marlinspike, “SSLStrip, Black Hat DC 2009”, Retrieved http://www.thoughtcrime.org/software/sslstrip/

S. Whalen, “An introduction to ARP spoofing,” 2600: The Hacker Quarterly, vol. 18, no. 3, Fall 2001,. Available:http://servv89pn0aj.sn.sourcedns.com/ g bpprorg/ 2600/arp spoofing intro.pdf

Snort Project, The Snort: The open source network intrusion detectionsystem. <http://www.snort.org>.

Demuth andA. Leitner.ARPspoofing and poisoning:Traffic tricks. Linux Magazine, 56:26–31, July 2011.

Downloads

Published

2015-11-30

How to Cite

1.
Kaur G, Malhotra J. Comparative Investigation of ARP Poisoning Mitigation Techniques Using Standard Testbed for Wireless Networks. JCSANDM [Internet]. 2015 Nov. 30 [cited 2024 Apr. 25];4(2-3):53-64. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/5153

Issue

Section

Articles