Page 17 - 2023-Vol19-Issue2
P. 17

13 |                                                            Nasser & Hussain

                                                                Fig. 6. Network topology

      Fig. 5. the response flowchartt

           V. EXPERIMENTAL RESULTS                                                Fig. 7. ARPtable under attack

A. Implementation                                                   After that, try out the defense on Client 1. When an ARP
   The suggested defense against ARP spoofing doesn’t re-       cache table is poisoned, the script may restore it and block
                                                                further attempts. Client 2, which does not use the protection
quire modifying the ARP protocol or imposing a particular       script, will still be susceptible to ARP spoofing because of
topology. The network must not be expanded with new hard-       its unprotected ARP cache table. Once the code has been
ware or software to implement the protection mechanism. As      activated, the ARP cache table and the result of the proposed
a result, it is portable, quick, and can quickly identify an    approach are shown in Figures below.
attack.

    PyCharm must be installed on two PCs with Intel(R)
Core(TM) i5-3320M CPUs running at 2.60 GHz, 8 GB of
RAM, Windows 10 64-bit, and a router. Since Kali Linux has
tools for testing, creating networks, and finding system secu-
rity vulnerabilities, we used the ARPspoof-tool to simulate
the attack scenario. Fig.6 shows our strategy in action.

B. Results                                                                        Fig. 8. ARPtable the proposal.

   During the experiment, initiate an ARP spoofing attack       C. Discussion
using the ARP Spoof tool in Kali Linux. The purpose of             Ten different ARP spoofing attacks against the network
sending ARP response packets across networks is to attack
the victim’s ARP table. And after the attack was successful     Architectures defined in Section 5 were attempted in this
because the spy, in this case, could hear and change what       test. The arpspoof tool is used in this experiment to do ARP
the victim and the network device were saying to each other.    spoofing, and the time was calculated using Python’s time
In fig.7 shows the damaged ARP cache table after the attack
scenario has been executed.
   12   13   14   15   16   17   18   19   20   21   22