dc.contributor.author |
Wai, Chit Hnin |
|
dc.date.accessioned |
2022-07-03T05:41:04Z |
|
dc.date.available |
2022-07-03T05:41:04Z |
|
dc.date.issued |
2022-06 |
|
dc.identifier.uri |
https://onlineresource.ucsy.edu.mm/handle/123456789/2682 |
|
dc.description.abstract |
Nowadays, communication is becoming more and more important to keep in
touch with family and friends. Computer networks play a key role in this paper. To make
this facilitating, Network engineers have used protocols for exchanging messages
between computers. Many protocols are optimized to simplify the initializing these sites.
However, it is still need to take security in some areas. This paper presents some of the
vulnerability that exists in the Address Resolution Protocol (ARP) protocol and
implements the Ticket based Address Resolution Protocol (TARP) by creating some
spoofing attacks such as Man-in-the-Middle (MITM) attack and DoS attack to deceive a
victim’s machine and a router for exploiting the weaknesses of ARP protocol. In the
experiments, TARP is implemented for ARP spoofing by distributing centrally secured
mapping of MAC/IP address through existing ARP messages. This system explored some
of operational vulnerability related with ARP security of deploying and administering. In
this system, window operating system is chosen as to implement the attack as well as the
defense creation. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University of Computer Studies, Yangon |
en_US |
dc.subject |
SECURITY CONTROL |
en_US |
dc.subject |
TICKET-BASED ADDRESS RESOLUTION PROTOCOL |
en_US |
dc.title |
SECURITY CONTROL BY TICKET-BASED ADDRESS RESOLUTION PROTOCOL |
en_US |
dc.type |
Thesis |
en_US |