Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi
DOI:
https://doi.org/10.56714/bjrs.48.2.12Keywords:
Network Security, MITM, ARP, ARP Spoofing, Authentication, De-authentication attackAbstract
The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain an unfair advantage. The research recommends developing a security system recognising and preventing ARP spoofing attacks. This system detects ARP spoofing attempts by comparing the static MAC address of the original router to the router's MAC address in the ARP cache table. After detecting the attack using information collected from the router's MAC address in the ARP cache table, the system will conduct a de-authentication attack against the attacker's MAC address. If the attacker is disconnected from the WLAN, they cannot perform ARP spoofing attacks. This system is operated using a Raspberry Pi Model B. Most ARP spoofing attacks can be detected in 0.93 seconds, and responding takes 3.05 seconds
Downloads
References
Q. Zu, B. Sun, Lecture Notes in Computer Science 8944, 598 (2015).
A.I. Abdulsada, D. G. Honi, S. Al-Darraji, Indonesian Journal of Electrical Engineering and Computer Science 23(1), 510 (2021).
P.P. Stepanov, G. V Nikonova, T. S. Pavlychenko, A. S. Gil, Journal of Physics: Conference Series 1791, 012061 (2021).
M.S. Hossain, A. Paul, M.H. Islam, M. Atiquzzaman, Network Protocols and Algorithms 10(1), 83 (2018).
S. Singh, D. Singh, Indian Journal of Science and Technology 11(22), 1 (2018).
S. Hijazi, M.S. Obaidat, IEEE Systems Journal 13(3), 2732 (2019).
M.F. Karzon, M.S. Modabbes, Inernational Journal and Computer.Applications 175(32), 20 (2020).
S.M. Morsy, D. Nashat, IEEE Access 10, 49142 (2022).
J.D. Wu, G.H. Huang, Applied Mechanics and Materials 433–435, 1681 (2013).
B. Prabadevi,N. Jeyanthi, International Journal of Advanced Intelligence Paradigms 10(1/2) ,146 (2018).
S. Venkatramulu, C.V.G. Rao, International Journal of Scientific and Research Publications 3(7), 1 (2013).
M.H. Alzuwaini, A.A. Yassin, Iraqi Journal for Electrical and Electronic Engineering 17(1), 125 (2021)
M. Data, 3rd International Conference on Sustainable Information Engineering and Technology, SIET Proceedings. 206 (2018).
V. Ramachandran, S. Nandi, International conference on information systems security. Springer, Berlin, Heidelberg, 239 (2005).
J.W. Choi, Journal of the Korea Institute of Information and Communication Engineering 21(1), 61 (2017).
H.A. Noman, S.M. Abdullah, H.I. Mohammed, IJCSI International Journal of Computer Science 12(4), 107 (2015).
D. Srinath, S.P.S. Panimalar, A.J. Simla, J.D.J.Deepa, International Journal of Computer Applications 113(19), 26 (2015).

Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Hiba Imad Nasser, Mohammed Abdulridha Hussain

This work is licensed under a Creative Commons Attribution 4.0 International License.