Abstract
A detective strategy with multi-layer modules and algorithm on ARP spoof attacks are proposed after some researches against the security problem of ARP. By the research of ARP and ARP attacks, and the consideration of resources and efficiency, the structure of the detective strategy is divided into mainly four modules, ARP spoof prediction module, head information detection, refusing ARP reply packets without request module and sending RARP request module. And there is also an extension module for extending. The result shows with the cooperation among the modules, many APR spoof attacks can be detected and prevented, and there are almost no mistakes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lin, H.G., Chen, L., Wang, B., Wu, Y.W.: Research on an Algorithm of Active Detecting and Resisting ARP Attack. Journal of Sichuan University (Engineering Science Edition) 40(2), 143–149 (2008)
Su, N.: The Campus Network ARP Attack Analysis and Defense Explore. Computer Knowledge and Technology 8(20), 4855–4856 (2012)
Liu, Y.: The deception attack of the LAN ARP address. China Foreign Trade (2), 318–318 (2011)
Wu, X.: The analysis of ARP protocol and the prevention of the ARP spoof virus. Market Modernization (584), 14–15 (2009)
Huang, T.F., Bai, G.W.: Method Against ARP Spoofing Based on Improved Protocol Mechanism. Computer Engineering 34(14), 168–170 (2008)
Sun, Z.Q.: A ARP Prevention Based on the Acknowledgement of Third Party. Pioneering with Science & Technology Monthly (9), 170–171 (2012)
Huang, K., Zhang, D.F.: An index-split Bloom filter for deep packet inspection. Science China (Information Sciences) (1), 23–37 (2011)
Meng, Y., Hou, Z.F., Ang, D.Y., Zhou, X.: One-Round Zero-Knowledge Proofs Protocol Based on Elliptic Curve. Computer Technology and Development 17(12), 147–150 (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zheng, M., Yang, S., Piao, X., Sun, W. (2015). Research on ARP Spoof Detection Strategies in Unreliable LAN. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-15554-8_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-15553-1
Online ISBN: 978-3-319-15554-8
eBook Packages: Computer ScienceComputer Science (R0)