Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application

© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subs...

Full description

Saved in:
Bibliographic Details
Main Authors: Ponpat Phetchai, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Suppawong Tuarob
Other Authors: Nara Institute of Science and Technology
Format: Conference or Workshop Item
Published: 2019
Subjects:
Online Access:https://repository.li.mahidol.ac.th/handle/123456789/45597
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Mahidol University
id th-mahidol.45597
record_format dspace
spelling th-mahidol.455972019-08-23T17:55:33Z Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application Ponpat Phetchai Jema David Ndibwile Doudou Fall Shigeru Kashihara Suppawong Tuarob Nara Institute of Science and Technology Mahidol University Computer Science © 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively. 2019-08-23T10:55:33Z 2019-08-23T10:55:33Z 2018-08-21 Conference Paper ICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding. (2018), 157-162 10.1109/ICSEC.2017.8443953 2-s2.0-85053468465 https://repository.li.mahidol.ac.th/handle/123456789/45597 Mahidol University SCOPUS https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053468465&origin=inward
institution Mahidol University
building Mahidol University Library
continent Asia
country Thailand
Thailand
content_provider Mahidol University Library
collection Mahidol University Institutional Repository
topic Computer Science
spellingShingle Computer Science
Ponpat Phetchai
Jema David Ndibwile
Doudou Fall
Shigeru Kashihara
Suppawong Tuarob
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
description © 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively.
author2 Nara Institute of Science and Technology
author_facet Nara Institute of Science and Technology
Ponpat Phetchai
Jema David Ndibwile
Doudou Fall
Shigeru Kashihara
Suppawong Tuarob
format Conference or Workshop Item
author Ponpat Phetchai
Jema David Ndibwile
Doudou Fall
Shigeru Kashihara
Suppawong Tuarob
author_sort Ponpat Phetchai
title Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
title_short Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
title_full Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
title_fullStr Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
title_full_unstemmed Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
title_sort securing low-computational-power devices against arp spoofing attacks through a lightweight android application
publishDate 2019
url https://repository.li.mahidol.ac.th/handle/123456789/45597
_version_ 1763492207198732288