Page 20 - 2023-Vol19-Issue2
P. 20

16 |                                                                 Nasser & Hussain

nectivity that is also simple to set up. Like all other types of           Cloud Comput. Internet Things, CCIOT 2014, pp. 22–35,
network security, wireless security involves protecting against            2014.
unwanted access to or destruction of machines or data inside
a wireless network.ARP spoofing is a severe problem in LAN            [6] A. S. Yadav, P. M. Natu, D. M. Sethia, A. B.Mundkar,
security. Despite the fact that various proposals for solving              and S. S. Sambare, “Prevention of spoofing attacks
the issue have lately been made, we have highlighted the flaws             in wireless networks,” International Conference on
with those ideas in this article, such as the fact that they do not        Computing Communication Control and Automation,
work, are too costly, or are difficult to manage.Furthermore,              pp. 164–171, Feb. 2015.
we have proposed an ARP spoof detection and protection
approach with none of the above drawbacks. In addition, we            [7] V. Rohatgi and S. Goyal, “A detailed survey for detec-
have created a software prototype corresponding to the ap-                 tion and mitigation techniques against arp spoofing,” 4th
proach and tested it on the suggested network’s architecture.              International Conference on IoT in Social, Mobile, Ana-
The experimental findings demonstrate the positive features                lytics and Cloud, ISMAC 2020, pp. 352–356, Oct. 2020.
of our approach and demonstrate that it is a good and effective
solution that is cost-effective in terms of hardware and useful       [8] S. Duddu, A. Rishitasai, C. L. S. Sowjanya, G. R. Rao,
for avoiding and preventing man-in-the-middle assaults in a                and K. Siddabattula, “Secure socket layer stripping at-
timely manner. In the future, we want to conduct compre-                   tack using address resolution protocol spoofing,” 4th
hensive testing of our approach on real-world networks (e.g.,              International Conference on Intelligent Computing and
college or university networks, student housing networks, and              Control Systems (ICICCS), pp. 973–978, May 2020.
workplace and business networks) in order to get honest user
feedback.                                                             [9] J. S. Meghana, T. Subashri, and K. R. Vimal, “A survey
                                                                           on arp cache poisoning and techniques for detection
              CONFLICT OF INTEREST                                         and mitigation,” 4th International Conference on Signal
                                                                           Processing, Communication and Networking (ICSCN),
   The authors have no conflict of relevant interest to this               pp. 1–6, Mar. 2017.
article.
                                                                     [10] R. Kumar, S. Verma, and G. S. Tomar, “Thwarting ad-
                     REFERENCES                                            dress resolution protocol poisoning using man in the
                                                                           middle attack in wlan,” Int. J. Reliab. Inf. Assur., vol. 1,
 [1] Y. Li, D. Li, W. Cui, and R. Zhang, “2011 ieee 3rd                    no. 1, pp. 7–18, Dec. 2013.
      international conference on communication software
      and networks,” CCSN 2011, pp. 554–557.                         [11] J. Xia, Z. Cai, G. Hu, and M. Xu, “An active defense
                                                                           solution for arp spoofing in open flow network,” Chinese
 [2] M. Fareed and A. A. Yassin, “Privacy-preserving multi-                Journal of Electronics, vol. 28, no. 1, pp. 172–178, 2019.
      factor authentication and role-based access control
      scheme for the e-healthcare system,” Bull. Electr. Eng.        [12] M. Alzuwaini and A. Yassin, “An efficient mechanism
      Informatics, vol. 11, no. 4, pp. 2131–2141, Aug. 2022.               to prevent the phishing attacks,” Iraqi J. Electr. Electron.
                                                                           Eng., vol. 17, no. 1, pp. 1–11, Jun. 2021.
 [3] H. A. Noman, S. M. Abdullah, and H. I. Mohammed,
      “An automated approach to detect deauthentication and          [13] S. Mahmood, S. M. Mohsin, and S. M. A. Akber, “Net-
      disassociation dos attacks on wireless 802 . 11 networks,”           work security issues of data link layer: An overview,”
      IJCSI International Journal of Computer Science Issues,              3rd Int. Conf. Comput. Math. Eng. Technol. Idea to Innov.
      vol. 12, no. 4, pp. 107–112, 2015.                                   Build. Knowl. Econ. iCoMET 2020), March, 2020.

 [4] A. A. Galal, A. Z. Ghalwash, and M. Nasr, “A new                [14] B. Prabadevi and N. Jeyanthi, “A framework to mitigate
      approach for detecting and mitigating address resolution             arp sniffing attacks by cache poisoning,” Int. J. Adv.
      protocol (arp) poisoning,” Int. J. Adv. Comput. Sci. Appl.,          Intell. Paradig., vol. 10, no. 1/2, p. 146, 2018.
      vol. 13, no. 6, 2022.
                                                                     [15] S. Hijazi and M. S. Obaidat, “A new detection and pre-
 [5] Z. Abduljabbar, H. Jin, D. Zou, A. A. Yassin, Z. Hussien,             vention system for arp attacks using static entry,” IEEE
      and M. A. Hussain, “An efficient and robust one-time                 Systems Journal, vol. 13, no. 3, pp. 2732–2738, 2019.
      message authentication code scheme using feature ex-
      traction of iris in cloud computing,” Proc. 2014 Int. Conf.    [16] A. Majumdar, S. Raj, and T. Subbulakshmi, “Arp poi-
                                                                           soning detection and prevention using scapy,” J. Phys.
                                                                           Conf. Ser., vol. 1911, no. 1, May 2021.
   15   16   17   18   19   20   21   22   23   24   25