Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi

Authors

  • Hiba Imad Nasser Department of Computer Science, College of Education for Pure Science, University of Basrah, Basrah, Iraq.
  • Mohammed Abdulridha Hussain Department of Computer Science, College of Education for Pure Science, University of Basrah, Basrah, Iraq.

DOI:

https://doi.org/10.56714/bjrs.48.2.12

Keywords:

Network Security, MITM, ARP, ARP Spoofing, Authentication, De-authentication attack

Abstract

 

The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain an unfair advantage. The research recommends developing a security system recognising and preventing ARP spoofing attacks. This system detects ARP spoofing attempts by comparing the static MAC address of the original router to the router's MAC address in the ARP cache table. After detecting the attack using information collected from the router's MAC address in the ARP cache table, the system will conduct a de-authentication attack against the attacker's MAC address. If the attacker is disconnected from the WLAN, they cannot perform ARP spoofing attacks. This system is operated using a Raspberry Pi Model B. Most ARP spoofing attacks can be detected in 0.93 seconds, and responding takes 3.05 seconds

Downloads

Download data is not yet available.

References

Q. Zu, B. Sun, Lecture Notes in Computer Science 8944, 598 (2015).

A.I. Abdulsada, D. G. Honi, S. Al-Darraji, Indonesian Journal of Electrical Engineering and Computer Science 23(1), 510 (2021).

P.P. Stepanov, G. V Nikonova, T. S. Pavlychenko, A. S. Gil, Journal of Physics: Conference Series 1791, 012061 (2021).

M.S. Hossain, A. Paul, M.H. Islam, M. Atiquzzaman, Network Protocols and Algorithms 10(1), 83 (2018).

S. Singh, D. Singh, Indian Journal of Science and Technology 11(22), 1 (2018).

S. Hijazi, M.S. Obaidat, IEEE Systems Journal 13(3), 2732 (2019).

M.F. Karzon, M.S. Modabbes, Inernational Journal and Computer.Applications 175(32), 20 (2020).

S.M. Morsy, D. Nashat, IEEE Access 10, 49142 (2022).

J.D. Wu, G.H. Huang, Applied Mechanics and Materials 433–435, 1681 (2013).

B. Prabadevi,N. Jeyanthi, International Journal of Advanced Intelligence Paradigms 10(1/2) ,146 (2018).

S. Venkatramulu, C.V.G. Rao, International Journal of Scientific and Research Publications 3(7), 1 (2013).

M.H. Alzuwaini, A.A. Yassin, Iraqi Journal for Electrical and Electronic Engineering 17(1), 125 (2021)

M. Data, 3rd International Conference on Sustainable Information Engineering and Technology, SIET Proceedings. 206 (2018).

V. Ramachandran, S. Nandi, International conference on information systems security. Springer, Berlin, Heidelberg, 239 (2005).

J.W. Choi, Journal of the Korea Institute of Information and Communication Engineering 21(1), 61 (2017).

H.A. Noman, S.M. Abdullah, H.I. Mohammed, IJCSI International Journal of Computer Science 12(4), 107 (2015).

D. Srinath, S.P.S. Panimalar, A.J. Simla, J.D.J.Deepa, International Journal of Computer Applications 113(19), 26 (2015).

Downloads

Published

30-12-2022

How to Cite

Nasser, H. I., & Hussain, M. A. (2022). Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi. Basrah Researches Sciences, 48(2), 123–135. https://doi.org/10.56714/bjrs.48.2.12

Issue

Section

Articles