Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subs...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Conference or Workshop Item |
Published: |
2019
|
Subjects: | |
Online Access: | https://repository.li.mahidol.ac.th/handle/123456789/45597 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Mahidol University |
id |
th-mahidol.45597 |
---|---|
record_format |
dspace |
spelling |
th-mahidol.455972019-08-23T17:55:33Z Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application Ponpat Phetchai Jema David Ndibwile Doudou Fall Shigeru Kashihara Suppawong Tuarob Nara Institute of Science and Technology Mahidol University Computer Science © 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively. 2019-08-23T10:55:33Z 2019-08-23T10:55:33Z 2018-08-21 Conference Paper ICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding. (2018), 157-162 10.1109/ICSEC.2017.8443953 2-s2.0-85053468465 https://repository.li.mahidol.ac.th/handle/123456789/45597 Mahidol University SCOPUS https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053468465&origin=inward |
institution |
Mahidol University |
building |
Mahidol University Library |
continent |
Asia |
country |
Thailand Thailand |
content_provider |
Mahidol University Library |
collection |
Mahidol University Institutional Repository |
topic |
Computer Science |
spellingShingle |
Computer Science Ponpat Phetchai Jema David Ndibwile Doudou Fall Shigeru Kashihara Suppawong Tuarob Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
description |
© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively. |
author2 |
Nara Institute of Science and Technology |
author_facet |
Nara Institute of Science and Technology Ponpat Phetchai Jema David Ndibwile Doudou Fall Shigeru Kashihara Suppawong Tuarob |
format |
Conference or Workshop Item |
author |
Ponpat Phetchai Jema David Ndibwile Doudou Fall Shigeru Kashihara Suppawong Tuarob |
author_sort |
Ponpat Phetchai |
title |
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
title_short |
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
title_full |
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
title_fullStr |
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
title_full_unstemmed |
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application |
title_sort |
securing low-computational-power devices against arp spoofing attacks through a lightweight android application |
publishDate |
2019 |
url |
https://repository.li.mahidol.ac.th/handle/123456789/45597 |
_version_ |
1763492207198732288 |