dc.contributor.author |
Phu, Khing Shwe Ye |
|
dc.date.accessioned |
2022-10-03T15:30:02Z |
|
dc.date.available |
2022-10-03T15:30:02Z |
|
dc.date.issued |
2022-09 |
|
dc.identifier.uri |
https://onlineresource.ucsy.edu.mm/handle/123456789/2746 |
|
dc.description.abstract |
Address Resolution Protocol (ARP) is a very popular
communication protocol in the local area network (LAN), working under
the network layer, as per the open systems interconnection (OSI) model.
ARP is used by computers to map logical addresses (IP) to physical
addresses (MAC). However ARP is an all trusting protocol and is
stateless which makes it vulnerable to many ARP cache poisoning attacks
such as Man-in-the-Middle (MITM) and Denial of Service (DoS) attacks.
These flaws result in security breaches thus the weakness of the computer
can be found for exchanging of sensitive data. This system describes
ARP, outline several possible ARP cache poisoning attacks and gives the
detailed of some attack scenarios in network having wireless hosts.
Hence, this system presents a DS-ARP that is able to cope up with all
these types of attacks and is also a feasible solution. For the proposed
system evaluation, this system will be compared with S-ARP protocol. |
en_US |
dc.language.iso |
en |
en_US |
dc.publisher |
University of Computer Studies, Yangon |
en_US |
dc.subject |
ARP CACHE POISONING ATTACKS |
en_US |
dc.subject |
DS-ARP AND S-ARP |
en_US |
dc.title |
SECURITY ANALYSIS FOR ARP CACHE POISONING ATTACKS USING DS-ARP AND S-ARP |
en_US |
dc.type |
Thesis |
en_US |