Page 20 - 2023-Vol19-Issue2
P. 20
16 | Nasser & Hussain
nectivity that is also simple to set up. Like all other types of Cloud Comput. Internet Things, CCIOT 2014, pp. 22–35,
network security, wireless security involves protecting against 2014.
unwanted access to or destruction of machines or data inside
a wireless network.ARP spoofing is a severe problem in LAN [6] A. S. Yadav, P. M. Natu, D. M. Sethia, A. B.Mundkar,
security. Despite the fact that various proposals for solving and S. S. Sambare, “Prevention of spoofing attacks
the issue have lately been made, we have highlighted the flaws in wireless networks,” International Conference on
with those ideas in this article, such as the fact that they do not Computing Communication Control and Automation,
work, are too costly, or are difficult to manage.Furthermore, pp. 164–171, Feb. 2015.
we have proposed an ARP spoof detection and protection
approach with none of the above drawbacks. In addition, we [7] V. Rohatgi and S. Goyal, “A detailed survey for detec-
have created a software prototype corresponding to the ap- tion and mitigation techniques against arp spoofing,” 4th
proach and tested it on the suggested network’s architecture. International Conference on IoT in Social, Mobile, Ana-
The experimental findings demonstrate the positive features lytics and Cloud, ISMAC 2020, pp. 352–356, Oct. 2020.
of our approach and demonstrate that it is a good and effective
solution that is cost-effective in terms of hardware and useful [8] S. Duddu, A. Rishitasai, C. L. S. Sowjanya, G. R. Rao,
for avoiding and preventing man-in-the-middle assaults in a and K. Siddabattula, “Secure socket layer stripping at-
timely manner. In the future, we want to conduct compre- tack using address resolution protocol spoofing,” 4th
hensive testing of our approach on real-world networks (e.g., International Conference on Intelligent Computing and
college or university networks, student housing networks, and Control Systems (ICICCS), pp. 973–978, May 2020.
workplace and business networks) in order to get honest user
feedback. [9] J. S. Meghana, T. Subashri, and K. R. Vimal, “A survey
on arp cache poisoning and techniques for detection
CONFLICT OF INTEREST and mitigation,” 4th International Conference on Signal
Processing, Communication and Networking (ICSCN),
The authors have no conflict of relevant interest to this pp. 1–6, Mar. 2017.
article.
[10] R. Kumar, S. Verma, and G. S. Tomar, “Thwarting ad-
REFERENCES dress resolution protocol poisoning using man in the
middle attack in wlan,” Int. J. Reliab. Inf. Assur., vol. 1,
[1] Y. Li, D. Li, W. Cui, and R. Zhang, “2011 ieee 3rd no. 1, pp. 7–18, Dec. 2013.
international conference on communication software
and networks,” CCSN 2011, pp. 554–557. [11] J. Xia, Z. Cai, G. Hu, and M. Xu, “An active defense
solution for arp spoofing in open flow network,” Chinese
[2] M. Fareed and A. A. Yassin, “Privacy-preserving multi- Journal of Electronics, vol. 28, no. 1, pp. 172–178, 2019.
factor authentication and role-based access control
scheme for the e-healthcare system,” Bull. Electr. Eng. [12] M. Alzuwaini and A. Yassin, “An efficient mechanism
Informatics, vol. 11, no. 4, pp. 2131–2141, Aug. 2022. to prevent the phishing attacks,” Iraqi J. Electr. Electron.
Eng., vol. 17, no. 1, pp. 1–11, Jun. 2021.
[3] H. A. Noman, S. M. Abdullah, and H. I. Mohammed,
“An automated approach to detect deauthentication and [13] S. Mahmood, S. M. Mohsin, and S. M. A. Akber, “Net-
disassociation dos attacks on wireless 802 . 11 networks,” work security issues of data link layer: An overview,”
IJCSI International Journal of Computer Science Issues, 3rd Int. Conf. Comput. Math. Eng. Technol. Idea to Innov.
vol. 12, no. 4, pp. 107–112, 2015. Build. Knowl. Econ. iCoMET 2020), March, 2020.
[4] A. A. Galal, A. Z. Ghalwash, and M. Nasr, “A new [14] B. Prabadevi and N. Jeyanthi, “A framework to mitigate
approach for detecting and mitigating address resolution arp sniffing attacks by cache poisoning,” Int. J. Adv.
protocol (arp) poisoning,” Int. J. Adv. Comput. Sci. Appl., Intell. Paradig., vol. 10, no. 1/2, p. 146, 2018.
vol. 13, no. 6, 2022.
[15] S. Hijazi and M. S. Obaidat, “A new detection and pre-
[5] Z. Abduljabbar, H. Jin, D. Zou, A. A. Yassin, Z. Hussien, vention system for arp attacks using static entry,” IEEE
and M. A. Hussain, “An efficient and robust one-time Systems Journal, vol. 13, no. 3, pp. 2732–2738, 2019.
message authentication code scheme using feature ex-
traction of iris in cloud computing,” Proc. 2014 Int. Conf. [16] A. Majumdar, S. Raj, and T. Subbulakshmi, “Arp poi-
soning detection and prevention using scapy,” J. Phys.
Conf. Ser., vol. 1911, no. 1, May 2021.