Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/4897
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Agrawal, Archit | - |
dc.date.accessioned | 2014-08-25T08:05:48Z | - |
dc.date.available | 2014-08-25T08:05:48Z | - |
dc.date.issued | 2014-06-01 | - |
dc.identifier.uri | http://hdl.handle.net/123456789/4897 | - |
dc.description.abstract | The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for conforming the identity of the sender includes a long history of being at risk of spoofing attacks. ARP spoofing is typically the place to begin for a lot of refined computer network attacks like denial of service, man in the middle and session hijacking. The current strategies of detection use a passive approach, monitoring the ARP traffic and searching for inconsistencies within the LAN to IP address mapping. The most downside of the passive approach is that the time lag between earning and detective work spoofing. This generally ends up in the attack being discovered long when it's been orchestrated. We use static ARP entry rather than Dynamic ARP entry in ARP cache as a result of its noticed that dynamic nature of ARP entry terribly vulnerable in network and might be used for ARP poisoning and ARP Spoofing attacks very simply. Static entries are already static in nature. Therefore providing static entries of ARP with a Unique Identity of host over the network, we are able to simply overcome from the MITM and DoS attacks. | en_US |
dc.publisher | Institute of Technology | en_US |
dc.relation.ispartofseries | 12MCEI35; | - |
dc.subject | Computer 2012 | en_US |
dc.subject | Project Report 2012 | en_US |
dc.subject | Computer Project Report | en_US |
dc.subject | Project Report | en_US |
dc.subject | 12MCEI | en_US |
dc.subject | 12MCEI35 | en_US |
dc.subject | INS | en_US |
dc.subject | INS 2012 | en_US |
dc.subject | CE (INS) | en_US |
dc.subject | ARP Cache Poisoning | en_US |
dc.subject | Denial of Service (DoS) Attack | en_US |
dc.subject | Man-in-the-Middle (MITM) Attack | en_US |
dc.subject | Cloning Attack | en_US |
dc.subject | Static ARP Cache | en_US |
dc.subject | Unique Identity | en_US |
dc.title | New Approach for Preventing ARP Spoofing using Unique Identity | en_US |
dc.type | Dissertation | en_US |
Appears in Collections: | Dissertation, CE (INS) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
12MCEI35.pdf | 12MCEI35 | 1.7 MB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.