• Home
  • Browse
    • Current Issue
    • By Issue
    • By Author
    • By Subject
    • Author Index
    • Keyword Index
  • Journal Info
    • About Journal
    • Aims and Scope
    • Editorial Board
    • Editorial Staff
    • Publication Ethics
    • Indexing and Abstracting
    • Related Links
    • FAQ
    • Peer Review Process
    • News
  • Guide for Authors
  • Submit Manuscript
  • Reviewers
  • Contact Us
 
  • Login
  • Register
Home Articles List Article Information
  • Save Records
  • |
  • Printable Version
  • |
  • Recommend
  • |
  • How to cite Export to
    RIS EndNote BibTeX APA MLA Harvard Vancouver
  • |
  • Share Share
    CiteULike Mendeley Facebook Google LinkedIn Twitter
International Journal of Intelligent Computing and Information Sciences
Articles in Press
Current Issue
Journal Archive
Volume Volume 18 (2018)
Volume Volume 17 (2017)
Volume Volume 16 (2016)
Volume Volume 15 (2015)
Volume Volume 14 (2014)
Issue Issue 2
Issue Issue 1
Elkilani, W. (2014). A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY. International Journal of Intelligent Computing and Information Sciences, 14(1), 1-19. doi: 10.21608/ijicis.2014.15759
W Elkilani. "A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY". International Journal of Intelligent Computing and Information Sciences, 14, 1, 2014, 1-19. doi: 10.21608/ijicis.2014.15759
Elkilani, W. (2014). 'A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY', International Journal of Intelligent Computing and Information Sciences, 14(1), pp. 1-19. doi: 10.21608/ijicis.2014.15759
Elkilani, W. A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY. International Journal of Intelligent Computing and Information Sciences, 2014; 14(1): 1-19. doi: 10.21608/ijicis.2014.15759

A SECURE ARCHITECTURE FOR DEFENDING ARP SPOOFING ATTACKS USING A SWITCH BASED METHODOLOGY

Article 1, Volume 14, Issue 1, January 2014, Page 1-19  XML
Document Type: Original Article
DOI: 10.21608/ijicis.2014.15759
Author
W Elkilani
Computer Systems Department, Faculty of Computers and Information, Ain Shames University Cairo, Egypt
Abstract
In local networks, security weaknesses in the data link layer enable internal attacks. Although
switches and routers have some built in security features, they are not enough to fully ensure the
security of local networks. Moreover, these features require network administrators' involvement and
are prone to miss-configuration. In addition, data link layer protocols used in local area networks
(LANs) are not designed with built-in security features. The most dangerous attacks on layer 2 are ARP
spoofing and MAC flooding attacks. Several schemes to mitigate, detect and prevent these attacks have
been proposed, but each has its limitations. This paper proposes a detection and prevention system for
ARP spoofing attacks. The system consists of two back to back servers. An application on the servers
allows authentication of users to a centralized server. The server, in turn, retrieves logged users to the
switch. Hence filtering of untrusted users is performed by telneting the main switch. The Performance
study has shown the efficiency and superiority of the proposed system, as compared to the previous
work. Several performance metrics have been measured to show its fast response to detection and
prevention of the ARP spoofing attacks. The system has been compared to one of the famous
commercial tools. The comparison has shown the superiority of our system, since the system detection
time is 20 time faster than that of the commercial tool.
Statistics
Article View: 48
Home | Glossary | News | Aims and Scope | Sitemap
Top Top

Journal Management System. Designed by NotionWave.