2014
DOI: 10.6109/jicce.2014.12.3.154
|View full text |Cite
|
Sign up to set email alerts
|

ARP Modification for Prevention of IP Spoofing

Abstract: The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…The security vulnerability of IEEE 802.1x is the weakness of brute force and MITM (man in the middle attack). These causes are due to the vulnerable issues with EAP And WEP [4,5].…”
Section: Related Researchmentioning
confidence: 99%
“…The security vulnerability of IEEE 802.1x is the weakness of brute force and MITM (man in the middle attack). These causes are due to the vulnerable issues with EAP And WEP [4,5].…”
Section: Related Researchmentioning
confidence: 99%
“…Address resolution protocol (ARP) is one of the important protocols in Transmission Control Protocol (TCP)/Internet protocol (IP) and is used to associate the IP address of the network layer to the MAC address of the data link layer , , , , , , . Using this protocol can identify how many hosts are connected in the LAN, and discover the MAC address to IP address, in an LAN environment .…”
Section: Introductionmentioning
confidence: 99%