| dc.contributor.author | Phu, Khing Shwe Ye | |
| dc.date.accessioned | 2022-10-03T15:30:02Z | |
| dc.date.available | 2022-10-03T15:30:02Z | |
| dc.date.issued | 2022-09 | |
| dc.identifier.uri | https://onlineresource.ucsy.edu.mm/handle/123456789/2746 | |
| dc.description.abstract | Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers to map logical addresses (IP) to physical addresses (MAC). However ARP is an all trusting protocol and is stateless which makes it vulnerable to many ARP cache poisoning attacks such as Man-in-the-Middle (MITM) and Denial of Service (DoS) attacks. These flaws result in security breaches thus the weakness of the computer can be found for exchanging of sensitive data. This system describes ARP, outline several possible ARP cache poisoning attacks and gives the detailed of some attack scenarios in network having wireless hosts. Hence, this system presents a DS-ARP that is able to cope up with all these types of attacks and is also a feasible solution. For the proposed system evaluation, this system will be compared with S-ARP protocol. | en_US | 
| dc.language.iso | en | en_US | 
| dc.publisher | University of Computer Studies, Yangon | en_US | 
| dc.subject | ARP CACHE POISONING ATTACKS | en_US | 
| dc.subject | DS-ARP AND S-ARP | en_US | 
| dc.title | SECURITY ANALYSIS FOR ARP CACHE POISONING ATTACKS USING DS-ARP AND S-ARP | en_US | 
| dc.type | Thesis | en_US |