Please use this identifier to cite or link to this item: http://10.1.7.192:80/jspui/handle/123456789/4897
Title: New Approach for Preventing ARP Spoofing using Unique Identity
Authors: Agrawal, Archit
Keywords: Computer 2012
Project Report 2012
Computer Project Report
Project Report
12MCEI
12MCEI35
INS
INS 2012
CE (INS)
ARP Cache Poisoning
Denial of Service (DoS) Attack
Man-in-the-Middle (MITM) Attack
Cloning Attack
Static ARP Cache
Unique Identity
Issue Date: 1-Jun-2014
Publisher: Institute of Technology
Series/Report no.: 12MCEI35;
Abstract: The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for conforming the identity of the sender includes a long history of being at risk of spoofing attacks. ARP spoofing is typically the place to begin for a lot of refined computer network attacks like denial of service, man in the middle and session hijacking. The current strategies of detection use a passive approach, monitoring the ARP traffic and searching for inconsistencies within the LAN to IP address mapping. The most downside of the passive approach is that the time lag between earning and detective work spoofing. This generally ends up in the attack being discovered long when it's been orchestrated. We use static ARP entry rather than Dynamic ARP entry in ARP cache as a result of its noticed that dynamic nature of ARP entry terribly vulnerable in network and might be used for ARP poisoning and ARP Spoofing attacks very simply. Static entries are already static in nature. Therefore providing static entries of ARP with a Unique Identity of host over the network, we are able to simply overcome from the MITM and DoS attacks.
URI: http://hdl.handle.net/123456789/4897
Appears in Collections:Dissertation, CE (INS)

Files in This Item:
File Description SizeFormat 
12MCEI35.pdf12MCEI351.7 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.