Skip to main content

Research on ARP Spoof Detection Strategies in Unreliable LAN

  • Conference paper
  • First Online:
Book cover Human Centered Computing (HCC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8944))

Included in the following conference series:

Abstract

A detective strategy with multi-layer modules and algorithm on ARP spoof attacks are proposed after some researches against the security problem of ARP. By the research of ARP and ARP attacks, and the consideration of resources and efficiency, the structure of the detective strategy is divided into mainly four modules, ARP spoof prediction module, head information detection, refusing ARP reply packets without request module and sending RARP request module. And there is also an extension module for extending. The result shows with the cooperation among the modules, many APR spoof attacks can be detected and prevented, and there are almost no mistakes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lin, H.G., Chen, L., Wang, B., Wu, Y.W.: Research on an Algorithm of Active Detecting and Resisting ARP Attack. Journal of Sichuan University (Engineering Science Edition) 40(2), 143–149 (2008)

    Google Scholar 

  2. Su, N.: The Campus Network ARP Attack Analysis and Defense Explore. Computer Knowledge and Technology 8(20), 4855–4856 (2012)

    Google Scholar 

  3. Liu, Y.: The deception attack of the LAN ARP address. China Foreign Trade (2), 318–318 (2011)

    Google Scholar 

  4. Wu, X.: The analysis of ARP protocol and the prevention of the ARP spoof virus. Market Modernization (584), 14–15 (2009)

    Google Scholar 

  5. Huang, T.F., Bai, G.W.: Method Against ARP Spoofing Based on Improved Protocol Mechanism. Computer Engineering 34(14), 168–170 (2008)

    Google Scholar 

  6. Sun, Z.Q.: A ARP Prevention Based on the Acknowledgement of Third Party. Pioneering with Science & Technology Monthly (9), 170–171 (2012)

    Google Scholar 

  7. Huang, K., Zhang, D.F.: An index-split Bloom filter for deep packet inspection. Science China (Information Sciences) (1), 23–37 (2011)

    Google Scholar 

  8. http://www.winpcap.org/docs/default.htm

  9. http://www.arpun.com/soft/451.html

  10. Meng, Y., Hou, Z.F., Ang, D.Y., Zhou, X.: One-Round Zero-Knowledge Proofs Protocol Based on Elliptic Curve. Computer Technology and Development 17(12), 147–150 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingchun Zheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Zheng, M., Yang, S., Piao, X., Sun, W. (2015). Research on ARP Spoof Detection Strategies in Unreliable LAN. In: Zu, Q., Hu, B., Gu, N., Seng, S. (eds) Human Centered Computing. HCC 2014. Lecture Notes in Computer Science(), vol 8944. Springer, Cham. https://doi.org/10.1007/978-3-319-15554-8_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15554-8_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15553-1

  • Online ISBN: 978-3-319-15554-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics