Research on ARP Attack and Defense
DOI: https://doi.org/10.62517/jsse.202508102
Author(s)
Lan Haoliang, Gao Gugang, Xu Jie, Xue Yishi, Ma Zhuo
Affiliation(s)
Department of Computer Information and Network Security, Jiangsu Police Institute, Nanjing, Jiangsu, China
Abstract
The network anomalies, illegal control, data theft and tampering caused by ARP attack have made ARP attack and defense a focus in the field of network security. In response to the common ARP attack in local area networks, the paper first analyzes the ARP protocol and its shortcomings. On this basis, the basic principles and common simulation methods of ARP attack were elaborated. Finally, the current mainstream ARP attack detection and defense methods were discussed in conjunction with network management.
Keywords
ARP Protocol; Local Area Network; Attack Detection; Attack Prevention
References
[1]Gouda M G, Huang C T. A secure address resolution protocol[J]. Computer Networks, 2003, 41(1): 57-71.
[2]Jin Yebing, Xia Yang. ARP attack and protection in large local area networks[J]. Microcomputer Information, 2009, 25(06): 101-102.
[3]Zhang Yuanyuan, Hou Jiantao. The principles and solutions of ARP attacks and ARP spoofing[J]. Coal Technology, 2010, 29(11): 199-200.
[4]Yu Long, Zhu Huiming, Tian Shengwei, et al. Research on ARP attack detection methods in campus networks based on SNMP[J]. Computer Applications and Software, 2011, 28(05): 120-122.
[5]Wang Li, Li Yusheng, Hu Lewei. Real-time detection and recovery of ARP attacks based on SNMP and WinPcap[J]. Science and Technology Bulletin, 2012, 28(06): 78-79.
[6]Cheng Yanyan. Network data leakage prevention method after ARP attacks[J]. Science Technology and Engineering, 2017, 17(34): 273-277.
[7]Song Yu, Li Zhilin, Cheng Chao. Industrial control system ARP attack intrusion detection method based on CNN-BILSTM[J]. Computer Applications Research, 2020, 37(S2): 242-244.
[8]Chen Yong, Zhan Zhixian, Liu Wen. Vulnerability analysis of the next-generation high-speed railway LTE-R time synchronization network protocol[J]. Journal of the China Railway Society, 2023, 45(01): 63-74.
[9]Qiu Hong, Shi Junyu, Tu Qiuyue. Analysis of ARP attacks and protection in local area networks[J]. Computer and Network, 2021, 47(01): 56-59.
[10]Wang Xiangyu, Qiu Chunrong. Experimental design based on "ARP attack and defense" course[J]. Laboratory Research and Exploration, 2009, 28(05): 175-177.
[11]Xu Dawei, Dai Cheng, Zhu Liehuang, et al. Solutions and examples of ARP attacks under SDN architecture[J]. Journal of Guangzhou University (Natural Science Edition), 2021, 20(04): 63-75.
[12]Pan Jiafu. Principle analysis and countermeasure research of ARP attacks[J]. Software Engineering, 2019, 22(05): 25-31.