Page 19 - 2023-Vol19-Issue2
P. 19

15 |                                                                                        Nasser & Hussain

                                                                       TABLE I.
                                                               THE MAIN METHODS

                                                               Methods             C1 C2 C3 C4 C5 C6 C7 C8 C9
                                                               Proposed            x ???x ????
                                                               Filter packet-tool  ????x x x ??
                                                               executable(batch)
                                                               file                ??x ?x x x ?x
                                                               ARPing tool-semi
      Fig. 13. Detection time.                                 Static              ??x ?x x x                   ?x
                                                               Fake list-GNS3
                                                               Defense tool        x ???x x x                   ?x
                                                               SDN (IDPs)          ?????x x                     ?x
                                                               ARP server appli-   x x ????x                    xx
                                                               cation
                                                               Dynamic IP con-     x ?????x                     xx
                                                               figuration
                                                               MD5 method to       ??x ?x ???x
                                                               create IP-MAC
                                                               database            x x ??x ???x
                                                               Sender&reciver
                                                               system              x x ??x ???x

                                                               tional assault techniques, as seen in Tabel.II.

                                                                                 TABLE II.
                                                               THE MAIN ATTACKS COMPARISONS.

                      Fig. 14. Response time.                                Methods        T1 T2 T3 T4 T5
                                                               Our proposed                 Yes Yes Yes Yes Yes
attacks.                                                       Filter packet-tool           Yes No No No Yes
    Proof: This attack is straightforward since the attackers  executable(batch) file       Yes Yes Yes No No
                                                               ARPing tool-semi Static      Yes No Yes Yes Yes
know and exploit ARP protocol weaknesses. The recom-           Fake list-GNS3               Yes No No No No
mended approach prevents spoofing attacks by Algorithm1        Defense tool                 Yes Yes Yes No No
creating two-factor authentication using a combination of Mac  SDN (IDPs)                   Yes No Yes No No
and HDD serial numbers and Algorithm2 validating the re-       ARP server application       Yes Yes Yes No No
quest and reply packets to guarantee they are safe against     Dynamic IP configuration     Yes No No No No
spoofing before transmission and reception. We also use Fer-   MD5 method to create IP-MAC
net encryption to keep unauthorized people from entering the   database                     Yes Yes No Yes Yes
database with verified IDs.                                    Sender&reciver system
                                                                                            Yes No Yes No Yes
    Comparison with related works
    This section compares our proposed technique to prior      T1: Withstand MITM attack;
studies. Tabel.I shows a direct comparison of many standard    T2: Withstand insider attack;
authentication methods:                                        T3: Withstand replay attack;
    C1: Static ARP;C2: ARP protocol;C3: Full Prevention        T4: Withstand user’s mac cloning attack;
of ARP spoofing;C4: Scalability;C5: Automation;C6: Au-         T5: Withstand DOS attack;
thentication;C7: Cryptographic;C8: Cost Effective;C9: Time
effective                                                                        VII. CONCLUSION
    Following are relevant comparisons of several conven-
                                                                  WLANs have quickly become a significant part of people’s
                                                               daily lives, making it crucial to provide users with secure con-
   14   15   16   17   18   19   20   21   22   23   24