Page 17 - 2023-Vol19-Issue2
P. 17
13 | Nasser & Hussain
Fig. 6. Network topology
Fig. 5. the response flowchartt
V. EXPERIMENTAL RESULTS Fig. 7. ARPtable under attack
A. Implementation After that, try out the defense on Client 1. When an ARP
The suggested defense against ARP spoofing doesn’t re- cache table is poisoned, the script may restore it and block
further attempts. Client 2, which does not use the protection
quire modifying the ARP protocol or imposing a particular script, will still be susceptible to ARP spoofing because of
topology. The network must not be expanded with new hard- its unprotected ARP cache table. Once the code has been
ware or software to implement the protection mechanism. As activated, the ARP cache table and the result of the proposed
a result, it is portable, quick, and can quickly identify an approach are shown in Figures below.
attack.
PyCharm must be installed on two PCs with Intel(R)
Core(TM) i5-3320M CPUs running at 2.60 GHz, 8 GB of
RAM, Windows 10 64-bit, and a router. Since Kali Linux has
tools for testing, creating networks, and finding system secu-
rity vulnerabilities, we used the ARPspoof-tool to simulate
the attack scenario. Fig.6 shows our strategy in action.
B. Results Fig. 8. ARPtable the proposal.
During the experiment, initiate an ARP spoofing attack C. Discussion
using the ARP Spoof tool in Kali Linux. The purpose of Ten different ARP spoofing attacks against the network
sending ARP response packets across networks is to attack
the victim’s ARP table. And after the attack was successful Architectures defined in Section 5 were attempted in this
because the spy, in this case, could hear and change what test. The arpspoof tool is used in this experiment to do ARP
the victim and the network device were saying to each other. spoofing, and the time was calculated using Python’s time
In fig.7 shows the damaged ARP cache table after the attack
scenario has been executed.