Skip to main content

Network Security Management Using ARP Spoofing

  • Conference paper
Computational Science and Its Applications – ICCSA 2004 (ICCSA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3043))

Included in the following conference series:

Abstract

IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the network, not from externally. This study concerns itself with how a Manager can integrate IP addresses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 74.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hastings, N.E., McLean, P.A.: TCP/IP spoofing fundamentals, Computers and Communications. In: Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference, pp. 218–224 (1996)

    Google Scholar 

  2. Ishibashi, H., Yamai, N., Abe, K., Matsuura, T.: A protection method against unauthorized access and address spoofing for open network access systems, Communications, Computers and signal Processing, 2001. In: PACRIM. 2001 IEEE Pacific Rim Conference, pp. 10–13 (2001)

    Google Scholar 

  3. Jain, S., Shenoy Ramam, D., Thirumalasetty, S.R., Saddi, M., Summa, F.: A Network Management Framework for Multi-layered Network: an Overview, Integrated Network Management Proceedings. In: IEEE/IFIP International Symposium, pp. 14–18 (2001)

    Google Scholar 

  4. Jackson, T., Wlikens, M.: Survivability of Networked Information Systems and Infrastructures: First Deliverable of an explanatory study, European Commission Special Report JRC/ISIS/STA/DAS/Projects/Survivability/Study, pp.1-37 (1998)

    Google Scholar 

  5. Oguchi, N., Chen, Y.M., Ogawa, J., Tsuruoka, T., Taniguchi, T., Nojima, S.: RISP: address resolution protocol in network layer. In: Local Computer Networks LCN 1998 Proceeding, pp. 99–108 (1998)

    Google Scholar 

  6. Laubach, M.: Classical IP and ARP over ATM. Request for Comments 1577 (1994)

    Google Scholar 

  7. Richard Stevens, W.: TCP/IP Illustrated, vol. 1, pp. 53–64. Addison-Wesley, Reading (1994)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kwon, K., Ahn, S., Chung, J.W. (2004). Network Security Management Using ARP Spoofing. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds) Computational Science and Its Applications – ICCSA 2004. ICCSA 2004. Lecture Notes in Computer Science, vol 3043. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24707-4_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-24707-4_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22054-1

  • Online ISBN: 978-3-540-24707-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics