2008 Third International Conference on Convergence and Hybrid Information Technology 2008
DOI: 10.1109/iccit.2008.345
|View full text |Cite
|
Sign up to set email alerts
|

Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol

Abstract: This research presents a design of "architecture and protocols" for the LAN security preventing the process of MAC Address spoofing, ARP Spoof and MITM. Each Network Card is designed to have a Certificate, a

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…There are many well-researched works of literature where spoofing defending system is discussed. Among them T. Demuth et al, 2005, D. Pansa et al, 2008, Z. Trabelsi et al, 2007and R. Philip et al, 2007 are mostly considerable (D. Pansa and T. Chomsiri, 2008;T. Demuth and A. Leitner, 2005; Z.…”
Section: Fig 2 Spoofing Methods Between Two Clientsmentioning
confidence: 99%
See 2 more Smart Citations
“…There are many well-researched works of literature where spoofing defending system is discussed. Among them T. Demuth et al, 2005, D. Pansa et al, 2008, Z. Trabelsi et al, 2007and R. Philip et al, 2007 are mostly considerable (D. Pansa and T. Chomsiri, 2008;T. Demuth and A. Leitner, 2005; Z.…”
Section: Fig 2 Spoofing Methods Between Two Clientsmentioning
confidence: 99%
“…Address Resolution Protocol has no states thus it provides very few securities to the caching system. Some top-notch researches referring from Ataullah and Chauhan (2012), Altunbasak et al (2004), Subashini and Kavitha (2011), Alabady (2009), Caceres and Padmanabhan (1998), Ford (2005), Pansa and Chomsiri (2008), Chomsiri (2008), Salim et al (2012), Demuth and Leitner (2005) shows the stateof-art (SoA) of using those security weaknesses for conducting a perfect MITM attack. Suppose, we have next network: the attacker 'X' (IP = 10.0.x.x3, MAC = EE:EE:EE:EE:EE:X3), victim 'A' (IP = 10.0.x.x1, MAC = AA:AA:AA:AA:AA:X1), and victim 'B' (IP = 10.0.x.x2, MAC = BB:BB:BB:BB:BB:X2).…”
Section: Spoofing: Most Common Mitmmentioning
confidence: 99%
See 1 more Smart Citation
“…Furthermore, addition of cryptographic features in ARP may lead to some performance overhead. Pansa and Chomsiri [28] proposed revision of the dynamic host configuration protocol (DHCP) definition to include authentication of network devices and inclusion of mapping information between IP and MAC addresses. Although flawless in concept, it would cause serious compatibility problems because DHCP is one of the most popular protocols.…”
Section: Server-based Approachesmentioning
confidence: 99%
“…However, search methods do not solve the ARP spoofing attack if the attacker is intelligent and customized its protocol stack, and this approach requires extra administration efforts. A technique that depends on installing a new DHCP server for use as a MAC-IP database center was proposed by [13]. However, DHCP is widely used and cannot be modified which makes this solution unrealistic.…”
Section: Related Workmentioning
confidence: 99%