Preventing ARP spoofing in WLAN using SHA-512

Author(s):  
Neha Agrawal ◽  
Bhale Pradeepkumar ◽  
Shashikala Tapaswi
Keyword(s):  
Author(s):  
Ting-Yu Lin ◽  
Jhen-Ping Wu ◽  
Pei-Hsuan Hung ◽  
Ching-Hsuan Shao ◽  
Yu-Ting Wang ◽  
...  

2013 ◽  
Vol 284-287 ◽  
pp. 3275-3279
Author(s):  
Jin Cherng Lin ◽  
Men Jue Koo ◽  
Cheng Sheng Wang

IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.


2015 ◽  
Author(s):  
Ahmed M. AbdelSalam ◽  
Ashraf B. El-Sisi ◽  
Vamshi Reddy K

In this paper we attempt to address Inter-Host Docker container communications security issues by incorporating a latest approach provided by Vault Hashicorp dynamic secret mechanism for managing SSH keys and server credentials. A simulation environment is prepared for Inter-Host container communication consisting of one host running locally and the peer host running as an AWS EC2 instance in cloud. Industry standard monitoring tool Grafana is used in the simulation environment to highlight the security impacts for any organization. We also draw special attention to some of the security vulnerabilities in docker container like ARP spoofing, Integrity of the docker host and containers and MAC flooding attacks. We try to list some best practices to be followed when using docker containers in any production deployments.


2020 ◽  
Vol 9 (1) ◽  
pp. 1736-1740

The great Man-in - the-Middle assault is centered around convincing two has that the other host is the machine in the center. In the event that the framework utilizes DNS to order the other host or address goals convention (ARP) ridiculing on the LAN, this might be accomplished with an area name parody. This paper targets presenting and delineating ARP ridiculing and its job in Man-in - the-Middle assaults. The expression "Man-in - the-Middle" is normal utilization—it doesn't imply that these assaults must be utilized by individuals. Maybe progressively sensible wording would be Teenager-in - theMiddle or Monkey-in - the-Middle. Progressively contact the assault can be identified using timing data much of the time. The most widely recognized kind of assaults happen because of reserve harming of Address Resolution Protocol (ARP), DNS satirizing, meeting commandeering, and SSL seizing


2021 ◽  
Author(s):  
Jinsheng Xu ◽  
Xiaohong Yuan ◽  
Swathi Nallela ◽  
Jinghua Zhang
Keyword(s):  

Author(s):  
Hannah A.S. Adjei ◽  
Mr Tan Shunhua ◽  
George K. Agordzo ◽  
Yangyang Li ◽  
Gregory Peprah ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document