Abstract
IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the network, not from externally. This study concerns itself with how a Manager can integrate IP addresses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, Computers and Communications. In: Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)
Ishibashi, H., Yamai, N., Abe, K., Matsuura, T.: A protection method against unauthorized access and address spoofing for open network access systems, Communications, Computers and signal Processing, 2001. In: PACRIM. 2001 IEEE Pacific Rim Conference, pp. 10–13 (2001)
Jain, S., Shenoy Ramam, D., Thirumalasetty, S.R., Saddi, M., Summa, F.: A Network Management Framework for Multi-layered Network: an Overview, Integrated Network Management Proceedings. In: IEEE/IFIP International Symposium, pp. 14–18 (2001)
Jackson, T., Wlikens, M.: Survivability of Networked Information Systems and Infrastructures: First Deliverable of an explanatory study, European Commission Special Report JRC/ISIS/STA/DAS/Projects/Survivability/Study, pp.1-37 (1998)
Oguchi, N., Chen, Y.M., Ogawa, J., Tsuruoka, T., Taniguchi, T., Nojima, S.: RISP: address resolution protocol in network layer. In: Local Computer Networks LCN 1998 Proceeding, pp. 99–108 (1998)
Laubach, M.: Classical IP and ARP over ATM. Request for Comments 1577 (1994)
Richard Stevens, W.: TCP/IP Illustrated, vol. 1, pp. 53–64. Addison-Wesley, Reading (1994)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kwon, K., Ahn, S., Chung, J.W. (2004). Network Security Management Using ARP Spoofing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_18
Download citation
DOI: https://doi.org/10.1007/978-3-540-24707-4_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22054-1
Online ISBN: 978-3-540-24707-4
eBook Packages: Springer Book Archive