UCSY's Research Repository

SECURITY ANALYSIS FOR ARP CACHE POISONING ATTACKS USING DS-ARP AND S-ARP

Show simple item record

dc.contributor.author Phu, Khing Shwe Ye
dc.date.accessioned 2022-10-03T15:30:02Z
dc.date.available 2022-10-03T15:30:02Z
dc.date.issued 2022-09
dc.identifier.uri https://onlineresource.ucsy.edu.mm/handle/123456789/2746
dc.description.abstract Address Resolution Protocol (ARP) is a very popular communication protocol in the local area network (LAN), working under the network layer, as per the open systems interconnection (OSI) model. ARP is used by computers to map logical addresses (IP) to physical addresses (MAC). However ARP is an all trusting protocol and is stateless which makes it vulnerable to many ARP cache poisoning attacks such as Man-in-the-Middle (MITM) and Denial of Service (DoS) attacks. These flaws result in security breaches thus the weakness of the computer can be found for exchanging of sensitive data. This system describes ARP, outline several possible ARP cache poisoning attacks and gives the detailed of some attack scenarios in network having wireless hosts. Hence, this system presents a DS-ARP that is able to cope up with all these types of attacks and is also a feasible solution. For the proposed system evaluation, this system will be compared with S-ARP protocol. en_US
dc.language.iso en en_US
dc.publisher University of Computer Studies, Yangon en_US
dc.subject ARP CACHE POISONING ATTACKS en_US
dc.subject DS-ARP AND S-ARP en_US
dc.title SECURITY ANALYSIS FOR ARP CACHE POISONING ATTACKS USING DS-ARP AND S-ARP en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics