A Survey on ARP Cache Poisoning And techniques for detection and mitigation

被引:0
|
作者
Meghana, Jitta Sai [1 ]
Subashri, T. [1 ]
Vimal, K. R. [1 ]
机构
[1] Anna Univ, Madras Inst Technol, Dept Elect Engn, Madras, Tamil Nadu, India
关键词
Address resolution protocol; ARP; ARP cache poisoning; attacks; security; Software-defined networks; SDN;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network security has become a major concern in any industry. Address resolution protocol (ARP) is a basic protocol used by all hosts in a network. When ARP is compromised, it leads to several security attacks. In this survey, we present a deep investigation of existing ARP cache poisoning or ARP spoofing solutions. We first introduce Address resolution protocol and its operation. We then dwell on ARP spoofing, with an emphasis on its impact on network security. Then we provide an overview on existing solutions to detect and mitigate ARP spoofing in both traditional networking and software-defined networking (SDN) platforms. Finally, we compare the techniques discussed and conclude that SDN based solutions are more effective in detecting and eliminating any kind of ARP spoofing attack.
引用
收藏
页数:6
相关论文
共 50 条
  • [41] ARP Poisoning Prevention in Internet of Things
    Gao, Weihua
    Sun, Yuhao
    Fu, Qingying
    Wu, Zhouzhe
    Ma, Xiao
    Zheng, Kai
    Huang, Xin
    2018 NINTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY IN MEDICINE AND EDUCATION (ITME 2018), 2018, : 733 - 736
  • [42] Detection and Mitigation of Targeted Data Poisoning Attacks in Federated Learning
    Erbil, Pinar
    Gursoy, M. Emre
    2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 271 - 278
  • [43] A survey on run-time packers and mitigation techniques
    Alkhateeb, Ehab
    Ghorbani, Ali
    Lashkari, Arash Habibi
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2024, 23 (02) : 887 - 913
  • [44] Voltage Unbalance for Power Systems and Mitigation Techniques a Survey
    Gupta, Gunjan
    Fritz, Wilfred
    PROCEEDINGS OF THE FIRST IEEE INTERNATIONAL CONFERENCE ON POWER ELECTRONICS, INTELLIGENT CONTROL AND ENERGY SYSTEMS (ICPEICES 2016), 2016,
  • [45] Phase Noise Mitigation Techniques in OFDM System: A Survey
    Mir, Mehraj Din
    Buttar, Avtar Singh
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [46] Survey on Recent DDoS Mitigation Techniques and Comparative Analysis
    Rai, Ankur
    Challa, Rama Krishna
    2016 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE & COMMUNICATION TECHNOLOGY (CICT), 2016, : 96 - 101
  • [47] Combating Fake News: A Survey on Identification and Mitigation Techniques
    Sharma, Karishma
    Qian, Feng
    Jiang, He
    Ruchansky, Natal
    Zhang, Ming
    Liu, Yan
    ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2019, 10 (03)
  • [48] Techniques for Connecting IGBT Modules and Loss Mitigation: A Survey
    Nawaz, Muhammad Zahid
    Khalil, Mohsin
    2020 IEEE SYMPOSIUM ON PRODUCT COMPLIANCE ENGINEERING (IEEE SPCE 2020), 2020,
  • [49] A survey on run-time packers and mitigation techniques
    Ehab Alkhateeb
    Ali Ghorbani
    Arash Habibi Lashkari
    International Journal of Information Security, 2024, 23 : 887 - 913
  • [50] Anomaly Detection and Mitigation at Internet Scale: A Survey
    Steinberger, Jessica
    Schehlmann, Lisa
    Abt, Sebastian
    Baier, Harald
    EMERGING MANAGEMENT MECHANISMS FOR THE FUTURE INTERNET (AIMS 2013), 2013, 7943 : 49 - 60