ASA: agent-based secure ARP cache management
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Oh, M. | - |
dc.contributor.author | Kim, Y-G | - |
dc.contributor.author | Hong, S. | - |
dc.contributor.author | Cha, S. | - |
dc.date.accessioned | 2021-09-06T20:14:33Z | - |
dc.date.available | 2021-09-06T20:14:33Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2012-05 | - |
dc.identifier.issn | 1751-8628 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/108496 | - |
dc.description.abstract | Address resolution protocol (ARP) is widely used to maintain mapping between data link (e.g. MAC) and network (e.g. IP) layer addresses. Although most hosts rely on automated and dynamic management of ARP cache entries, current implementation is well-known to be vulnerable to spoofing or denial of service (DoS) attacks. There are many tools that exploit vulnerabilities of ARP protocols, and past proposals to address the weaknesses of the 'original' ARP design have been unsatisfactory. Suggestions that ARP protocol definition be modified would cause serious and unacceptable compatibility problems. Other proposals require customised hardware be installed to monitor malicious ARP traffic, and many organisations cannot afford such cost. This study demonstrates that one can effectively eliminate most threats caused by the ARP vulnerabilities by installing anti-ARP spoofing agent (ASA), which intercepts unauthenticated exchange of ARP packets and blocks potentially insecure communications. The proposed approach requires neither modification of kernel ARP software nor installation of traffic monitors. Agent uses user datagram protocol (UDP) packets to enable networking among hosts in a transparent and secure manner. The authors implemented agent software on Windows XP and conducted an experiment. The results showed that ARP hacking tools could not penetrate hosts protected by ASA. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | INST ENGINEERING TECHNOLOGY-IET | - |
dc.subject | ATTACKS | - |
dc.title | ASA: agent-based secure ARP cache management | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Kim, Y-G | - |
dc.contributor.affiliatedAuthor | Cha, S. | - |
dc.identifier.doi | 10.1049/iet-com.2011.0566 | - |
dc.identifier.scopusid | 2-s2.0-84862259589 | - |
dc.identifier.wosid | 000305296500001 | - |
dc.identifier.bibliographicCitation | IET COMMUNICATIONS, v.6, no.7, pp.685 - 693 | - |
dc.relation.isPartOf | IET COMMUNICATIONS | - |
dc.citation.title | IET COMMUNICATIONS | - |
dc.citation.volume | 6 | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 685 | - |
dc.citation.endPage | 693 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Engineering | - |
dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
dc.subject.keywordPlus | ATTACKS | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.