Abstract
Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the sensitive information like account details, patient records, genomics details for biomedical research and defence details leading to cyber-war. Data are vulnerable at any level of communication. The link-layer Address Resolution Protocol (ARP) is initiated for any data communication to take place among the hosts in a LAN. Because of the stateless nature of this protocol, it has been misused for illegitimate activities. These activities lead to the most devasting attacks like Denial of Service, Man-in-the-Middle, host impersonation, sniffing, and cache poisoning. Though various host-based and network-based intrusion detection/prevention techniques exist, they fail to provide a complete solution for this type of poisoning. This paper analyzes the existing defence systems against ARP attacks and proposes three different techniques for detecting and preventing the ARP attacks. The three techniques ensure security of traditional ARP and its impact in Medical computing where a single bit inversion could lead to wrong diagnosis.
Similar content being viewed by others
References
Al-Hemairy M, Amin S, Trabelsi Z (2009) Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks. In: 2009 international conference on the current trends in information technology (CTIT), IEEE, pp 1–6
Bidgoli H (2006) Handbook of information security, information warfare, social, legal, and international issues and security foundations, vol 2. Wiley, Hoboken
Bradley T, Brown C, Malis A (1998) Inverse address resolution protocol (No. RFC 2390)
Bruschi D, Ornaghi A, Rosti E (2003) S-ARP: a secure address resolution protocol. In: Proceedings. 19th annual computer security applications conference, 2003, IEEE, pp 66–74
Cheshire S (2008) IPv4 Address conflict detection, RFC 4227
Dangol S, Selvakumar S, Brindha M (2011) Genuine arp (garp): a broadcast based stateful authentication protocol. ACM SIGSOFT Softw Eng Notes 36(4):1–10
Hammouda S, Trabelsi Z (2009) An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, ACM, pp 942–946
Hingne A, Jain S (2016) A survey on various detection and prevention mechanism for MITM and ARP attacks. Int J Innov Res Comput Commun Eng 4(11):19918–19924
Issac B (2009) Secure ARP and secure DHCP protocols to mitigate security attacks. Int J Netw Secur 8(2):107–118
Jana I (2017) Effect of ARP poisoning attacks on modern operating systems. Inf Secur J A Global Perspect 26(1):1–6
Kaur J, Dhanda SK (2014) An analysis of local area network ARP spoofing. Int J Latest Trends in Eng Technol 4(3):117–123
Lootah W, Enck W, McDaniel P (2007) TARP: ticket-based address resolution protocol. Comput Netw 51(15):4322–4337
Pandey P (2013) Prevention of ARP spoofing: a probe packet based technique. In: 2013 IEEE 3rd international advance computing conference (IACC), IEEE, pp 147–153
Plummer DC (1982) An ethernet address resolution protocol-converting network protocol to 48 bit ethernet address for transmission on ethernet hardware. RFC-826
Prabadevi B, Jeyanthi N (2014) Distributed denial of service attacks and its effects on cloud environment-a survey. In: The 2014 international symposium on networks, computers and communications, IEEE, pp 1–5
Prabadevi B, Jeyanthi N (2017a) Security solution for ARP cache poisoning attacks in large data centre networks. Cybern Inf Technol 17(4):69–86
Prabadevi B, Jeyanthi N (2017) A mitigation system for ARP cache poisoning attacks. In: Proceedings of the second international conference on internet of things and cloud computing, ACM, p 20
Prabadevi B, Jeyanthi N (2018) A framework to mitigate ARP sniffing attacks by cache poisoning. Int J Adv Intell Paradig 10(1–2):146–159
Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP Spoof problem. In: 6th international conference on electrical engineering/electronics, computer, telecommunications and information technology, 2009. ECTI-CON 2009, IEEE, vol 2, pp 910–913
Quarterman JS (1987) RFC 1027—using ARP to implement transparent subnet gateways. Request for Comments, ‘Online, pp 1–7
Rupal DR, Satasiya D, Kumar H, Agrawal A (2016) Detection and prevention of ARP poisoning in dynamic IP configuration. In: IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), IEEE, pp 1240–1244
Samvedi A, Owlak S, Chaurasia VK (2014) Improved secure address resolution protocol. arXiv preprint arXiv:1406.2930
Saputro N, Akkaya K (2015) PARP-S: a secure piggybacking-based ARP for IEEE 802.11 s-based Smart Grid AMI networks. Comput Commun 58:16–28
Song MS, Lee JD, Jeong YS, Jeong HY, Park JH (2014) DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. Sci World J 2014:1–8. https://doi.org/10.1155/2014/264654
Trabelsi Z (2016) The robustness of microsoft windows and apple mac OS X against ARP cache poisoning based network attacks. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC), IEEE, pp 1074–1079
Trabelsi Z, El-Hajj W (2010) On investigating ARP spoofing security solutions. Int J Internet Protoc Technol 5(1–2):92–100
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Prabadevi, B., Jeyanthi, N. & Abraham, A. An analysis of security solutions for ARP poisoning attacks and its effects on medical computing. Int J Syst Assur Eng Manag 11, 1–14 (2020). https://doi.org/10.1007/s13198-019-00919-1
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-019-00919-1