skip to main content
research-article

Genuine ARP (GARP): a broadcast based stateful authentication protocol

Published: 04 August 2011 Publication History

Abstract

Address Resolution Protocol (ARP) is used to map the network address (IP address) to a physical address (MAC address). Being a stateless protocol and lacking proper authentication mechanism in the ARP messages, ARP is vulnerable for cache poisoning attack. Attacker can perform Man-In-The-Middle (MITM) attack or Denial of Service (DoS) attack and can access sensitive information, modify the contents, or deny the host from getting services. Different techniques for the detection and prevention of ARP cache poisoning attack have been proposed. Detection techniques (such as ARPWatch and Intrusion Detection techniques) generate false positives. Some prevention technique makes change in the switch itself and some uses cryptographic techniques. Secure-ARP and Ticket based ARP (TARP) are cryptographic techniques but suffer from single point failure and ticket flooding attacks respectively. ARP is a stateless protocol and ARP messages lacks the address authentication mechanism. As an ARP reply is unicast, all host systems in the LAN are not aware of the attacker present in the LAN. In this paper, we have proposed a protocol known as "Genuine Address Resolution Protocol (GARP)". Two novel concepts, viz., broadcastbased reply, and the Certifier for proof of IP address ownership have been proposed in GARP. As a reply is broadcast, the host, whose IP the attacker is using for attack, is aware of the attacker and subsequently makes other hosts in the LAN also aware of the attacker. Thus, the protocol prevents possible attack from the same attacker in the future. Statefulness is achieved by two tables, viz., the pending table and the blacklist table. The pending table holds the reply till its genuineness is proved and the blacklist table holds the MAC of attacker. Furthermore, the Certificate Authority is responsible for monitoring the ARP activities, which intervenes with appropriate messages at appropriate instances. The Dynamic Host Configuration Protocol (DHCP) server could be loaded with the additional service of monitoring ARP activities. The protocol has been implemented on Linux operating system. GARP was tested for various possible cases of ARP cache poisoning attack. From the results, it could be inferred that the GARP provides security against ARP cache poisoning attacks.

References

[1]
Abad, C. L. and Bonilla, R. I. An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks. In 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07), (Toronto, Canada, June 25-29, 2007), 60--67. DOI=http://dx.doi.org/10.1109/ICDCSW.2007.19.
[2]
Anticap. Retreived August 1, 2010: http://www.antifork.org/trac/browser/trunk/anticap
[3]
ARP Spoofing. Retreived August 1, 2010, from Wikimedia Foundation: http://en.wikipedia.org/wiki/ARP_spoofing
[4]
Bruschi, D., Ornaghi, A. and Rosti, E. S-ARP: A secure address resolution protocol. In Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC '03), (Las Vegas, Nevada, December 08-12, 2003), 66--74.DOI= http://doi.ieeecomputersociety.org/10.1109/CSAC.2003.1254311
[5]
Cisco Systems. Configuring Dynamic ARP Inspection, Catalyst 6500 Series Switch Cisco IOS Software Configuration Guide, Release 12.2SX. 2009, 50.1--50.22.
[6]
Denial of service attacks. Retreived August 1, 2010, from Wikimedia Foundation: http://en.wikipedia.org/wiki/Man-in-themiddle_attack
[7]
Droms, R. Dynamic Host Configuration Protocol. Retreived August 2, 2010, from Internet Society: http://www.ietf.org/rfc/rfc2131.txt
[8]
Forouzan, B. A. Data Communications and Networking. 4th edition, Mc Graw Hill, 2007, 611--618.
[9]
Goyal, V. and Tripathy, R. An Efficient Solution to the ARP Cache Poisoning Problem. In Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05), (Brisbane, Australia, July 4-6, 2005), 40--51. DOI= http://dx.doi.org/10.1007/11506157_4
[10]
Hubballi, N., Roopa, S., Ratti, R., Barbhuiya, F.A., Biswas, S., Sur, A., Nandi, S. and Ramachandran, V., An Active Intrusion Detection System for LAN Specific Attacks, In Proceedings of the 2010 international conference on Advances in computer science and information technology, (Verlag Berlin, Heidelberg 2010), 129--142.
[11]
L. N. R. Group. ARPWatch. Retreived August 10, 2010: ftp://ftp.ee.lbl.gov/arpwatch.tar.gz.
[12]
Lootah, W., Enck, W., and McDaniel, P. TARP: Ticket-based address resolution protocol, J. Computer Networks, 51(15), 4322--4337.
[13]
Man-In-The-Middle attack. Retreived August 1, 2010, from Wikimedia Foundation: http://en.wikipedia.org/wiki/Man_in_the_middle_attack
[14]
Plummer, D. C. Address Resolution Protocol. Retreived July 23, 2010: http://www.ietf.org/rfc/rfc0826.txt
[15]
Snort Project, The. Snort: The open source network intrusion detection system, (2006). Retreived August 1, 2010: http://www.snort.org
[16]
Teterin, I. Antidote. Retreived August 1, 2010: http://online.securityfocus.com/archive/1/299929
[17]
The OpenSSL library. http://www.openssl.org.
[18]
The Packet capture library. http://www.tcpdump.org.

Cited By

View all
  • (2021)A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle AttackIT Professional10.1109/MITP.2019.295613123:1(72-85)Online publication date: 1-Jan-2021
  • (2019)An analysis of security solutions for ARP poisoning attacks and its effects on medical computingInternational Journal of System Assurance Engineering and Management10.1007/s13198-019-00919-1Online publication date: 13-Nov-2019
  • (2018)TSCBA-A Mitigation System for ARP Cache Poisoning AttacksCybernetics and Information Technologies10.2478/cait-2018-004918:4(75-93)Online publication date: 14-Dec-2018
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGSOFT Software Engineering Notes
ACM SIGSOFT Software Engineering Notes  Volume 36, Issue 4
July 2011
142 pages
ISSN:0163-5948
DOI:10.1145/1988997
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 August 2011
Published in SIGSOFT Volume 36, Issue 4

Check for updates

Author Tags

  1. ARP cache poisoning attack
  2. DoS attack
  3. GARP
  4. MITM attack
  5. ceritifier
  6. verifier

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)9
  • Downloads (Last 6 weeks)1
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2021)A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle AttackIT Professional10.1109/MITP.2019.295613123:1(72-85)Online publication date: 1-Jan-2021
  • (2019)An analysis of security solutions for ARP poisoning attacks and its effects on medical computingInternational Journal of System Assurance Engineering and Management10.1007/s13198-019-00919-1Online publication date: 13-Nov-2019
  • (2018)TSCBA-A Mitigation System for ARP Cache Poisoning AttacksCybernetics and Information Technologies10.2478/cait-2018-004918:4(75-93)Online publication date: 14-Dec-2018
  • (2017)Security Solution for ARP Cache Poisoning Attacks in Large Data Centre NetworksCybernetics and Information Technologies10.1515/cait-2017-004217:4(69-86)Online publication date: 27-Nov-2017
  • (2017)A mitigation system for ARP cache poisoning attacksProceedings of the Second International Conference on Internet of things, Data and Cloud Computing10.1145/3018896.3018915(1-7)Online publication date: 22-Mar-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media