The Centralized management method to increase the security of ARP. Qinggui Hu

Similar documents
The new method to prevent ARP spoofing based on 802.1X protocol. Qinggui Hu

Example: Configuring DHCP Snooping and DAI to Protect the Switch from ARP Spoofing Attacks

Example: Configuring DHCP Snooping, DAI, and MAC Limiting on an EX Series Switch with Access to a DHCP Server Through a Second Switch

Switching & ARP Week 3

Connecting to the Network

IPv6 Traffic Hijack Test System and Defense Tools Using DNSSEC

A Framework for Optimizing IP over Ethernet Naming System

NETWORK INTRUSION. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

Quiz 7 May 14, 2015 Computer Engineering 80N

Lab 9.8.1: Address Resolution Protocol (ARP)

Homework 3 Discussion

ARP Inspection and the MAC Address Table for Transparent Firewall Mode

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

2. What is a characteristic of a contention-based access method?

Operation Manual ARP H3C S5500-SI Series Ethernet Switches. Table of Contents

ARP Inspection and the MAC Address Table

Chapter 5: Ethernet. Introduction to Networks - R&S 6.0. Cisco Networking Academy. Mind Wide Open

Ruijie Anti-ARP Spoofing

DHCP Configuration. Page 1 of 14

ARP SPOOFING Attack in Real Time Environment

Configuring ARP attack protection 1

An Approach to Addressing ARP Spoof Using a Trusted Server. Yu-feng CHEN and Hao QIN

CS4450. Computer Networks: Architecture and Protocols. Lecture 20 Pu+ng ALL the Pieces Together. Spring 2018 Rachit Agarwal

CSC 6575: Internet Security Fall Attacks on Different OSI Layer Protocols OSI Layer Basic Attacks at Lower Layers

IP: Addressing, ARP, Routing

White Paper. Ruijie DHCP Snooping. White Paper

CSC 574 Computer and Network Security. TCP/IP Security

IP Addressing and Subnetting

Internetwork Expert s CCNA Security Bootcamp. Mitigating Layer 2 Attacks. Layer 2 Mitigation Overview

Putting it all together

Homework 4 assignment for ECE374 Posted: 04/06/15 Due: 04/13/15

Practice MAC Address Me ia Access Control address uniquely Data Link Cont n r t o r l Logical Link Control Media Access Control

Lies, Damn Lies and ARP Replies

AN INTRODUCTION TO ARP SPOOFING

Cisco CCNA Basic IP Routing Part I

This is a sample Lab report from ECE 461 from previous years. L A B 6

CS 458 Internet Engineering Spring First Exam

Chapter 6 Connecting Device

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. June 18, 2015

PUCPR. Internet Protocol. Edgard Jamhour E N G L I S H S E M E S T E R

CS 457 Lecture 11 More IP Networking. Fall 2011

Lecture 16: Router Design

Chapter 5 Reading Organizer After completion of this chapter, you should be able to:

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Configuring ARP attack protection 1

2017 2nd International Conference on Communications, Information Management and Network Security (CIMNS 2017) ISBN:

Configuring Dynamic ARP Inspection

Keywords: ARP Protocol; ARP Cache; ARP Spoofing Attack; Reverse ARP Poisoning, Active IP Probing

ARP attack protection commands

EECS Introduction to Computer Networking. Local Area Networks / Ethernet. Hub

Analysis of Virtual Local Area Networking Technology. Zheng Zhang

Chapter 4: Routing Concepts. Routing & Switching

Exercise 1 INTERNET. x.x.x.254. net /24. net /24. x.x.x.33. x.x.x.254. x.x.x.52. x.x.x.254. x.x.x.254. x.x.x.

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

ICS 451: Today's plan

Copyright 2011 Sakun Sharma

Chapter 3 LAN Configuration

Example: Configuring IP Source Guard with Other EX Series Switch Features to Mitigate Address-Spoofing Attacks on Untrusted Access Interfaces

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Lab Using Wireshark to Examine Ethernet Frames

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

Network Security. The Art of War in The LAN Land. Mohamed Sabt Univ Rennes, CNRS, IRISA Thursday, September 27th, 2018

Improving Reliability in Ethernet Control Networks

Mobile Ad-hoc Networks. Intended status: Informational July 16, 2012 Expires: January 17, 2013

TCP/IP and the OSI Model

Chapter 7. ARP and RARP MGH T MGH C I 20

Configuring MAC Address Tables

Penetration testing using Kali Linux - Network Discovery

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide

Lab Using Wireshark to Examine Ethernet Frames

ARP, IP, TCP, UDP. CS 166: Introduction to Computer Systems Security 4/7/18 ARP, IP, TCP, UDP 1

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Unit C - Network Addressing Objectives Purpose of an IP Address and Subnet Mask Purpose of an IP Address and Subnet Mask

Keywords. IPv6 network; network topology auto-discovery; IPv6 address; IPv6 stateless address autoconfiguration

H3C S10500 Attack Protection Configuration Examples

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. **Slides are attributed to J. F. Kurose

DHCP Technology White Paper

Chapter 5: Trouble shooting of a network

Detecting the Auto-configuration Attacks on IPv4 and IPv6 Networks

LANs do not normally operate in isolation. They are connected to one another or to the Internet. To connect LANs, connecting devices are needed.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Last time. Network layer. Introduction. Virtual circuit vs. datagram details. IP: the Internet Protocol. forwarding vs. routing

ENEE 457: Computer Systems Security 11/07/16. Lecture 18 Computer Networking Basics

IT220 Network Standards & Protocols. Unit 8: Chapter 8 The Internet Protocol (IP)

A COMPARISON OF IMPROVED AODV ROUTING PROTOCOL BASED ON IEEE AND IEEE

Chapter 8 ARP(Address Resolution Protocol) Kyung Hee University

Configuring ARP. Prerequisites for Configuring ARP. Restrictions for Configuring ARP

20-CS Cyber Defense Overview Fall, Network Basics

Internet Protocol Addressing and Routing. Redes TCP/IP

CSCI 680: Computer & Network Security

Static NAT Mapping with HSRP

Routing. Directly Connected IP Networks. Data link layer routing. ifconfig command

FINAL EXAM - SLOT 2 TCP/IP NETWORKING Duration: 90 min. With Solutions

Request for Comments: 2583 Category: Informational ANL May Guidelines for Next Hop Client (NHC) Developers. Status of this Memo

Outline. SC/CSE 3213 Winter Sebastian Magierowski York University. ICMP ARP DHCP NAT (not a control protocol) L9: Control Protocols

IP/MAC Address Translation

IPv6 ND Configuration Example

Cisco Exam Cisco Certified Network Associate (CCNA) Version: 14.7 [ Total Questions: 653 ]

Operation Manual DHCP. Table of Contents

Transcription:

Joint International Mechanical, Electronic and Information Technology Conference (JIMET 2015) The Centralized management method to increase the security of ARP Qinggui Hu eijiang Teachers College, eijiang 641112, Szechwan Province, China hu646100177@126.com Keywords: ARP; OPET; Lan; Buffer table; Concentration Management Abstract. This study puts forward the new centralized management method to strengthen the security of ARP. The switch is the core of the LA, it could manage ARP in concentration. When the switch receives the ARP request message the switch will check the source address is legal or not. If the source address is legal, the ARP request message would be dealt with by the switch. Otherwise, the ARP request message would be discarded. Introduction With the development of communications and Internet technology, network security becomes more and more important. Although the address resolution protocol (ARP) [1] is one of the oldest (e.g. RFC 826 was defined in 1982) and most widely used (e.g. IEEE 802.11 and Ethernet), it is also one of the most vulnerable protocols. Every host, including gateways, maintains the ARP cache table which contains information on all valid pairs of media access control (MAC) and IP addresses on the local network. ARP cache management scheme includes static and dynamic modes. The former requires operator intervention in maintaining currency of all the cache entries which stay permanently until manually removed. Although known to be secure enough, it is seldom used in practice [2]. In this paper, the new centralized management method is put forward to strengthen the security of ARP. The switch is the core of the LA, it could manage ARP in concentration. According to the author, when the switch receives the ARP request message the switch will check the source address is legal or not. If the source address is legal, the ARP request message would be dealt with by the switch. Otherwise, the ARP request message would be discarded. Working principle of ARP ARP is the abbreviation of Address Resolution protocol. It is a TCP/IP protocol, which is used to interpret IP address into MAC address. With the protocol of ARP, one host could communicate with others. Every host has an ARP cache table, in which MAC and IP have the one-to-one relationship. When host A wants to communicate with host B, firstly, he could search the MAC of host B in his ARP cache. If he finds the right MAC, he could communicate directly. If he could not find the MAC, he could send out the ARP broadcast to look for the MAC of host B. When other hosts receive this ARP broadcast, if someone discovers he is the very host that the broadcast is looking for, he will send out ARP reply. When host A receives the reply, he will believe it without doubt and update his ARP cache. Then, the two hosts could communicate directly. 2015. The authors - Published by Atlantis Press 551

The new ARP management method: the centralized management According to the opinion of the author, the cause of ARP security flaw lies in the decentralized management on ARP. If we adopt centralized management method, the security could be enhanced. The switch is the core of the LA, it could manage ARP in concentration [3]. According to the author, when the switch receives the ARP request message,the switch will check the source address is legal or not. If the source address is legal, the ARP request message would be dealt with by the switch. Otherwise, the ARP request message would be discarded. As the following Fig.1 shows, the new protocol could work like the following steps. Firstly, the switch has a cache table, which recording the ARP information of IP-MAC-switch_port. Secondly, when the switch receives the ARP request message, it does not broadcast the ARP request in LA. However, the switch will check the source address is legal or not. If the MAC of the source address exists in the ARP cache table already, at the same time, both IP and switch_port of the source address are same with that of the ARP cache table, then, the source user is legal. If the MAC of the source address exists in the ARP cache table, but IP or switch_port are OT same with that of the ARP cache table, in this case, the source address is illegal, its ARP request message will be discarded. If the MAC of the source address DOES OT exist in the ARP cache table, in this case, to suppose IP of the source address is A, MAC is B, then, the switch will broadcast the ARP package to ask whose MAC is B, please reply your IP. If the switch receives only one ARP reply, at the same time, the IP is just A, then, the source user is legal. The switch will update its ARP cache table. Otherwise, the source user is illegal. Its ARP request message will be discarded. After the switch confirms the source user is legal, then, the switch will manage its ARP request message like the following steps. Firstly, the switch will check its ARP cache table. If the IP of the destination client exists in the ARP cache table, the switch will reply the ARP request message directly. If the IP of the destination client DOES OT exist in the ARP cache table, the switch will broadcast ARP request to look for the destination client. If the switch receives only one reply, it will forward this ARP reply to the source host. At the same time, the switch will update its ARP cache table. If the switch receives two different ARP replies, those ARP replies would be discarded, and the switch will inform the source host that ARP query failure. If the switch receives no ARP replies, after a period of time, it will broadcast the ARP request again[4]. In addition, the switch will discard all ARP reply whose destination addresses are not the switch itself. 552

receive the ARP request source user is legal destination IP in ARP cache Sending ARP packet look for destination IP Reply the ARP Receive one reply request The end query failure Fig. 1 work process of the new ARP management method The simulation with OPET OPET is a common network simulation software, it adopts three-layer model, which are process model, node model and network model respectively. The simulation result could reflect the performance of the network. Commonly, the network simulation includes the following steps, which are setting topology, design node model and proceeding model, setting traffic,run simulation etc[5]. To set the topology. In order to research the performance of the improved ARP protocol, the following simple network structure model is set up. As Fig.2 shows, 4 hosts connect a switch, the switch connects a router, the router connects another switch that connects 4 hosts also. We suppose Wkstn1 send out lots of ARP spoofing packages to all other clients. According to traditional ARP protocol, all other clients will trust the ARP spoofing packages without doubt. But according to the improved ARP protocol, all the ARP packages will be dealt with by the switch. When the switch discovers the ARP packages are illegal, it will discard those ARP packages [6]. 553

Fig. 2 The topology The node model and the proceeding model. In above network structure model, the node model of all the client computers adopt ethernet_wkstn_adv node model, which is carried by OPET the software itself. At the same time, the node models of both the switch and the router are provided by the software itself. In order to compare the different performance between the traditional ARP protocol and the improved ARP protocol, in above node model, for ARP module process, we adopt traditional ARP proceeding model, named ip_arp_v4, which is carried by the software itself, Configure the business and simulation result. After the network structure model is set up and the process is designed, we configure the business for the network and determine the statistics. In order to compare the different performance between the traditional ARP protocol and the improved ARP protocol,we let Wkstn1 send out lots of ARP spoofing packages to all other clients. Under the different ARP protocols, we study the different simulation result. In this simulation experiment, firstly, we gather the queuing delay from Wkstn2 to Wkstn6 as the statistics. As the Fig.3 shown, with the traditional ARP protocol, the value is about 0.000011 sec. But with the improved ARP protocol, the value is about 0.000007 sec. The simulation result shows the performance of the improved ARP protocol could be better. According the author s opinion, with the new ARP protocol, when Wkstn1 send out lots of ARP spoofing packages to all other clients, those ARP packages will be discarded by the switch. Those ARP spoofing packages could not influence the whole network. Then, the queuing delay from Wkstn2 to Wkstn6 is smaller. 554

Fig.3 The queuing delay from Wkstn2 to Wkstn6 Conclusion In this paper, we addressed how ARP attacks can be effectively defeated without modification of the ARP kernel software. Many approaches have attempted to address vulnerability associated with ARP cache management in dynamic mode. et, the security risk remained the same. We developed the new centralized management method is to strengthen the security of ARP. The switch is the core of the LA, it could manage ARP in concentration. When the switch receives the ARP request message,the switch will check the source address is legal or not. If the source address is legal, the ARP request message would be dealt with by the switch. Otherwise, the ARP request message would be discarded. At last, the performance of the new protocol is simulated with OPET software, which shows the new protocol could guard against the majority of ARP deceit. References [1] RFC-826: An ethernet address resolution protocol, 1982 [2] Kozierok, C.M.: TCP/IP guide (o Starch Press, 2005, 1st edn.) [3] http://arpspoof.sourceforge.net, accessed July 2011 [4] http://www.oxid.it/cain.html, accessed July 2011 [5] http://ettercap.sourceforge.net/index.php, accessed July 2011 [6] http://sid.rstack.org/arp-sk/, accessed July 2011 [7] http://www.toolcrypt.org/tools/tratt/index.html, accessed July 2011 555