Please use this identifier to cite or link to this item: https://idr.l3.nitk.ac.in/jspui/handle/123456789/15081
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSelvarajan S.
dc.contributor.authorMohan M.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:16:22Z-
dc.date.available2021-05-05T10:16:22Z-
dc.date.issued2020
dc.identifier.citation2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/ICCCNT49239.2020.9225413
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/15081-
dc.description.abstractAddress Resolution Protocol was developed to create a standard for translating IP addresses to physical addresses. ARP takes (IP, Protocol) as input and converts to physical address. ARP can be easily spoofed because it lacks security. The inventors of ARP thought that internal to the network threats were minimum, and ARP had to be simple for its efficient and dynamic working. A machine in the network, which can work at the data link layer, can be easily spoofed because of the vulnerability in ARP protocol, leading to a man-in-the-middle attack. Securing ARP is not an easy task because state information should be preserved for authentication of ARP frames. However, the protocol is stateless, and making changes to the ARP protocol itself is not practical since the protocol is currently being widely used. Our objective in this paper is to provide a solution to detect and mitigate ARP spoofing attacks without any changes to the protocol itself. The proposed system provides improvement to an existing solution using ICMP to detect ARP spoofing. © 2020 IEEE.en_US
dc.titleTechniques to Secure Address Resolution Protocolen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.