Skip to main content
Log in

An analysis of security solutions for ARP poisoning attacks and its effects on medical computing

  • Original Article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the sensitive information like account details, patient records, genomics details for biomedical research and defence details leading to cyber-war. Data are vulnerable at any level of communication. The link-layer Address Resolution Protocol (ARP) is initiated for any data communication to take place among the hosts in a LAN. Because of the stateless nature of this protocol, it has been misused for illegitimate activities. These activities lead to the most devasting attacks like Denial of Service, Man-in-the-Middle, host impersonation, sniffing, and cache poisoning. Though various host-based and network-based intrusion detection/prevention techniques exist, they fail to provide a complete solution for this type of poisoning. This paper analyzes the existing defence systems against ARP attacks and proposes three different techniques for detecting and preventing the ARP attacks. The three techniques ensure security of traditional ARP and its impact in Medical computing where a single bit inversion could lead to wrong diagnosis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14

Similar content being viewed by others

References

  • Al-Hemairy M, Amin S, Trabelsi Z (2009) Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks. In: 2009 international conference on the current trends in information technology (CTIT), IEEE, pp 1–6

  • Bidgoli H (2006) Handbook of information security, information warfare, social, legal, and international issues and security foundations, vol 2. Wiley, Hoboken

    Google Scholar 

  • Bradley T, Brown C, Malis A (1998) Inverse address resolution protocol (No. RFC 2390)

  • Bruschi D, Ornaghi A, Rosti E (2003) S-ARP: a secure address resolution protocol. In: Proceedings. 19th annual computer security applications conference, 2003, IEEE, pp 66–74

  • Cheshire S (2008) IPv4 Address conflict detection, RFC 4227

  • Dangol S, Selvakumar S, Brindha M (2011) Genuine arp (garp): a broadcast based stateful authentication protocol. ACM SIGSOFT Softw Eng Notes 36(4):1–10

    Article  Google Scholar 

  • Hammouda S, Trabelsi Z (2009) An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, ACM, pp 942–946

  • Hingne A, Jain S (2016) A survey on various detection and prevention mechanism for MITM and ARP attacks. Int J Innov Res Comput Commun Eng 4(11):19918–19924

    Google Scholar 

  • Issac B (2009) Secure ARP and secure DHCP protocols to mitigate security attacks. Int J Netw Secur 8(2):107–118

    Google Scholar 

  • Jana I (2017) Effect of ARP poisoning attacks on modern operating systems. Inf Secur J A Global Perspect 26(1):1–6

    Article  Google Scholar 

  • Kaur J, Dhanda SK (2014) An analysis of local area network ARP spoofing. Int J Latest Trends in Eng Technol 4(3):117–123

    Google Scholar 

  • Lootah W, Enck W, McDaniel P (2007) TARP: ticket-based address resolution protocol. Comput Netw 51(15):4322–4337

    Article  Google Scholar 

  • Pandey P (2013) Prevention of ARP spoofing: a probe packet based technique. In: 2013 IEEE 3rd international advance computing conference (IACC), IEEE, pp 147–153

  • Plummer DC (1982) An ethernet address resolution protocol-converting network protocol to 48 bit ethernet address for transmission on ethernet hardware. RFC-826

  • Prabadevi B, Jeyanthi N (2014) Distributed denial of service attacks and its effects on cloud environment-a survey. In: The 2014 international symposium on networks, computers and communications, IEEE, pp 1–5

  • Prabadevi B, Jeyanthi N (2017a) Security solution for ARP cache poisoning attacks in large data centre networks. Cybern Inf Technol 17(4):69–86

    Google Scholar 

  • Prabadevi B, Jeyanthi N (2017) A mitigation system for ARP cache poisoning attacks. In: Proceedings of the second international conference on internet of things and cloud computing, ACM, p 20

  • Prabadevi B, Jeyanthi N (2018) A framework to mitigate ARP sniffing attacks by cache poisoning. Int J Adv Intell Paradig 10(1–2):146–159

    Article  Google Scholar 

  • Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP Spoof problem. In: 6th international conference on electrical engineering/electronics, computer, telecommunications and information technology, 2009. ECTI-CON 2009, IEEE, vol 2, pp 910–913

  • Quarterman JS (1987) RFC 1027—using ARP to implement transparent subnet gateways. Request for Comments, ‘Online, pp 1–7

  • Rupal DR, Satasiya D, Kumar H, Agrawal A (2016) Detection and prevention of ARP poisoning in dynamic IP configuration. In: IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), IEEE, pp 1240–1244

  • Samvedi A, Owlak S, Chaurasia VK (2014) Improved secure address resolution protocol. arXiv preprint arXiv:1406.2930

  • Saputro N, Akkaya K (2015) PARP-S: a secure piggybacking-based ARP for IEEE 802.11 s-based Smart Grid AMI networks. Comput Commun 58:16–28

    Article  Google Scholar 

  • Song MS, Lee JD, Jeong YS, Jeong HY, Park JH (2014) DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. Sci World J 2014:1–8. https://doi.org/10.1155/2014/264654

    Article  Google Scholar 

  • Trabelsi Z (2016) The robustness of microsoft windows and apple mac OS X against ARP cache poisoning based network attacks. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC), IEEE, pp 1074–1079

  • Trabelsi Z, El-Hajj W (2010) On investigating ARP spoofing security solutions. Int J Internet Protoc Technol 5(1–2):92–100

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Prabadevi.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Prabadevi, B., Jeyanthi, N. & Abraham, A. An analysis of security solutions for ARP poisoning attacks and its effects on medical computing. Int J Syst Assur Eng Manag 11, 1–14 (2020). https://doi.org/10.1007/s13198-019-00919-1

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-019-00919-1

Keywords

Navigation