2018
DOI: 10.1002/spy2.49
|View full text |Cite
|
Sign up to set email alerts
|

Address resolution protocol spoofing attacks and security approaches: A survey

Abstract: Address resolution protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. It is used to associate Internet protocol (IP) address to medium access control (MAC) address; hence, the IP‐MAC addresses are stored in ARP cache of any network host. ARP has weakness in authentication that an attacker can exploit to gain unauthorized access to one's sensitive data. There are some approaches that can b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
17
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 26 publications
(18 citation statements)
references
References 21 publications
0
17
0
1
Order By: Relevance
“…Some studies [7,[14][15][16][17][18][19][20] in the current literature have carried out a survey to classify and analyze various solutions to mitigate the ARP Cache Poisoning Attack in traditional networks. In [7], authors carry out a survey on MITM attacks in traditional networks.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Some studies [7,[14][15][16][17][18][19][20] in the current literature have carried out a survey to classify and analyze various solutions to mitigate the ARP Cache Poisoning Attack in traditional networks. In [7], authors carry out a survey on MITM attacks in traditional networks.…”
Section: Related Workmentioning
confidence: 99%
“…All these solutions are briefly explained by authors in [7]; however, critical evaluation of various solutions is limited and future research directions are not proposed. A survey on various detection and mitigation solutions to the ARP Cache Poisoning attack is also presented in [14]. A key feature of research presented in [14] is the proposal of three future research directions to detect and mitigate this attack.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, the vulnerabilities in the ARP structure have resulted in security breaches by spoofing the IP/MAC addresses. These types of attacks on the ARP are more problematic for the cloud centers and particularly in the open cloud environments [17]. ARP translates the IP address into MAC address by defining the destination through broadcasting and deciding the host through response frames received.…”
Section: Introductionmentioning
confidence: 99%