Demonstration of ARP attacking tools exploiting cyber -Security vulnerabilities of ARP

Ackoski, Jugoslav (2020) Demonstration of ARP attacking tools exploiting cyber -Security vulnerabilities of ARP. IDEA International Journal of Science and Arts, 4 (4). ISSN 2545-4552

[thumbnail of IJSA-IDEA-Vol-4-No-7-1-min.pdf] Text
IJSA-IDEA-Vol-4-No-7-1-min.pdf - Published Version

Download (1MB)

Abstract

Nowadays, with the prevalence of the Internet, network security plays a very important role as an infrastructural foundation for safe communications in the network environment. As a result of that, many kinds of network intrusion techniques and sniffing tools are generated, and the network attack has become much more threatening to the Internet users than ever before. In such a case, this paper has the aim to give contribution study for this educational purpose. The main objective is to show future challenges related to cyber security, and their threats, arising from the increased number of attacking tools. It provides analysis based on a practical experiment carried out on a number of solutions regarding their ability to impersonate another host (man in the middle), and gain access to sensitive information. This ability was easy to gain by exploiting the vulnerabilities of the ARP- Address Resolution Protocol, which was not designed to cope a malicious host. So, that was the starting point. By analysing the networking principle of ARP protocol, and discussing the security vulnerability existing in the process of mapping IP address to MAC address, final results gave out the accomplishment of ARP spoofing in internal networks. Finally, the researches and practical proofs in this study proved that ARP spoofing was considered as one of the easiest, but dangerous method in one LAN.

Item Type: Article
Subjects: Natural sciences > Computer and information sciences
Divisions: Military Academy
Depositing User: Jugoslav Ackoski
Date Deposited: 20 Jun 2022 08:29
Last Modified: 20 Jun 2022 08:29
URI: https://eprints.ugd.edu.mk/id/eprint/29858

Actions (login required)

View Item View Item