Reference Hub5
Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs

Kenan Kalajdzic, Ahmed Patel, Mona Taghavi
Copyright: © 2011 |Volume: 3 |Issue: 3 |Pages: 11
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781613506479|DOI: 10.4018/jdcf.2011070104
Cite Article Cite Article

MLA

Kalajdzic, Kenan, et al. "Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs." IJDCF vol.3, no.3 2011: pp.50-60. http://doi.org/10.4018/jdcf.2011070104

APA

Kalajdzic, K., Patel, A., & Taghavi, M. (2011). Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. International Journal of Digital Crime and Forensics (IJDCF), 3(3), 50-60. http://doi.org/10.4018/jdcf.2011070104

Chicago

Kalajdzic, Kenan, Ahmed Patel, and Mona Taghavi. "Two Methods for Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs," International Journal of Digital Crime and Forensics (IJDCF) 3, no.3: 50-60. http://doi.org/10.4018/jdcf.2011070104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper describes two novel methods for active detection and prevention of ARP-poisoning-based Man-in-the-Middle (MitM) attacks on switched Ethernet LANs. As a stateless and inherently insecure protocol, ARP has been used as a relatively simple means to launch Denial-of-Service (DoS) and MitM attacks on local networks and multiple solutions have been proposed to detect and prevent these types of attacks. MitM attacks are particularly dangerous, because they allow an attacker to monitor network traffic and break the integrity of data being sent over the network. The authors introduce backwards compatible techniques to prevent ARP poisoning and deal with sophisticated stealth MitM programs.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.