Agent-based ARP cache poisoning detection in switched LAN environments

Agent-based ARP cache poisoning detection in switched LAN environments

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Networks — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Address resolution protocol (ARP) cache poisoning is mostly used to perform man-in-the-middle (MITM) and denial of service (DoS) attacks for sniffing and network services disruption, respectively, in switch LAN networks. The former attack affects the privacy of a network user, whereas the latter attack causes huge damage to networks in terms of unavailability of services. There are many security solutions that provide protection against such type of attacks at firewall level with the assumption that an insider attack does not exist. However, the most damaging and severe attacks on universities database servers to well-known banking system have been caused by insider malicious users. In this study, the authors propose an agent-based ARP cache poisoning detection (AACPD) scheme that detects the MITM and DoS attacks in a switch LAN environment. The objective of this scheme is to provide protection from insider malicious users. The proposed AACPD is compared with similar existing schemes in a real-time environment. The experimental results show that AACPD efficiently and accurately detects attackers with minimum effect on network performance as compared to similar existing schemes.

Related content

This is a required field
Please enter a valid email address