Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subs...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Published: |
2019
|
Subjects: | |
Online Access: | https://repository.li.mahidol.ac.th/handle/123456789/45597 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Mahidol University |
Summary: | © 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively. |
---|