George Mukalath, Salint (2022) Novel Technique to Detect and Defend Address Resolution Protocol Poisoning. Masters thesis, Dublin, National College of Ireland.
Preview |
PDF (Master of Science)
Download (623kB) | Preview |
Preview |
PDF (Configuration manual)
Download (571kB) | Preview |
Abstract
The world of today is now completely dependent on networks and protocols designed to make setting up these networks easier, however some of them did not take security safeguards. Usually, security team not giving more importance in the security of layer 2 of the Open System Interconnect (OSI) layers, which is the main motive of this project. Since there is no authentication mechanism provided by ARP for inbound request packets, any user may use fake ARP message and insert malicious data to corrupt the target machine’s ARP cache. ARP spoofing is used by attackers for interfering in the communication between two devices and performing a man in the middle (MITM) attack. MAC and IP addresses of the packets of data being transferred in a network will analyzed by the system for performing ARP spoofing attack detection. The system will alert the user on detecting the attack and it will restore the ARP cache table to its original form as the table will be modified when the attack occurs. The scapy library will be used for obtaining the MAC and IP addresses and the performance of the system developed will be evaluated by generating an attack on a device in which the detection system is running. The result of the approach shows that the ARP spoofing attack can be effectively detected based on the analysis of the MAC and IP addresses of the data packets.
Item Type: | Thesis (Masters) |
---|---|
Supervisors: | Name Email Salahuddin, Jawad UNSPECIFIED |
Subjects: | Q Science > QA Mathematics > Electronic computers. Computer science T Technology > T Technology (General) > Information Technology > Electronic computers. Computer science T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunications > Computer networks Q Science > QA Mathematics > Computer software > Computer Security T Technology > T Technology (General) > Information Technology > Computer software > Computer Security |
Divisions: | School of Computing > Master of Science in Cyber Security |
Depositing User: | Tamara Malone |
Date Deposited: | 28 Apr 2023 14:16 |
Last Modified: | 28 Apr 2023 15:12 |
URI: | https://norma.ncirl.ie/id/eprint/6516 |
Actions (login required)
View Item |