Abstract
Sometimes network resources including IP address, MAC address, and hostname could be misused for the weakness of TCP/IP protocol suite and the deficiency of network management. Therefore, there is urgent need to solve the problems from the viewpoint of network management and operation. In this paper, we propose a network network blocking algorithm based on ARP spoofing and evaluate the robustness of this algorithm via various experiments. We have performed several experiments on the gratuitous ARP exchange and IP address conflict detection in order to identify the robustness of the network blocking algorithm under both homogeneous and heterogeneous operating system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kwon, K., Ahn, S., Chung, J.: Network security management using ARP spoofing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 142–149. Springer, Heidelberg (2004)
J. Koo, S. Ahn, and J. Chung, Network Blocking Algorithm and Architecture for Network Resource and Security Management, Proc. ISPC Comm. 2004, Bishkek, pp.181-186, 2004.
Bellovin, S.M.: Security problems in the TCP/IP protocol suite. Computer Communication Review 19(2), 32–48 (1989)
Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, computers and communications. In: Proc. IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)
Davies, J., Lee, T.: Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference. Microsoft Press (2003)
Maxim, M., Pollino, D.: Wireless security. RSA Press (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Koo, J., Ahn, S., Lim, Y., Mun, Y. (2005). Evaluation of Network Blocking Algorithm Based on ARP Spoofing and Its Application. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2005. ICCSA 2005. Lecture Notes in Computer Science, vol 3481. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11424826_91
Download citation
DOI: https://doi.org/10.1007/11424826_91
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-25861-2
Online ISBN: 978-3-540-32044-9
eBook Packages: Computer ScienceComputer Science (R0)