Advertisement

Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

  • S. U. UllasEmail author
  • J. Sandeep
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 750)

Abstract

Ubiquitous computing is a new paradigm in the world of information technology. Security plays a vital role in such networking environments. However, there are various methods available to generate different Media Access Control (MAC) addresses for the same system, which enables an attacker to spoof into the network. MAC spoofing is one of the major concerns in such an environment where MAC address can be spoofed using a wide range of tools and methods. Different methods can be prioritized to get cache table and attributes of ARP spoofing while targeting the identification of the attack. The routing trace-based technique is the predominant method to analyse MAC spoofing. In this paper, a detailed survey has been done on different methods to detect and prevent such risks. Based on the survey, a new proposal of security architecture has been proposed. This architecture makes use of Monitoring System (MS) that generates frequent network traces into MS table, server data and MS cache which ensures that the MAC spoofing is identified and blocked from the same environment.

Keywords

ARP spoofing MAC spoofing MS Network trace Broadcast Man-in-the-middle attack 

References

  1. 1.
    Hsiao, H.-W., Lin, C.S., Chang, S.-Y.: Constructing an ARP attack detection system with SNMP traffic data mining. In: Proceedings of the 11th International Conference on Electronic Commerce (ICEC 09). ACM DL (2009)Google Scholar
  2. 2.
    Kim, J.: IP spoofing detection technique for endpoint security enhancement. J. Korean Inst. Inf. Technol. 75–83 (2017)Google Scholar
  3. 3.
    Benzaïd, C., Boulgheraif, A., Dahmane, F.Z., Al-Nemrat, A., Zeraoulia, K.: Intelligent detection of MAC spoofing attack in 802.11 network. In: ’16 Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN), Article No. 47. ACM (2016)Google Scholar
  4. 4.
    Asija, M.: MAC address. Int. J. Technol. Eng. IRA (2016). ISSN 2455-4480Google Scholar
  5. 5.
    Moon, D., Lee, J.D., Jeong, Y.-S., Park, J.H.: RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks. J. Supercomput. 72(5), 1740–1756 (2016)Google Scholar
  6. 6.
    Tian, D.(J.), Butler, K.R.B., Choi, J., McDaniel, P.D., Krishnaswamy, P.: Securing ARP/NDP from the ground up. IEEE Trans. Inf. Forensics Secur. 12(9), 2131–2143 (2017)Google Scholar
  7. 7.
    Barbhuiya, F.A.: Detection of neighbor discovery protocol based attacks in IPv6 network. Networking Sci. 2, 91–113 (2013) (Tsinghua University Press and Springer, Berlin)Google Scholar
  8. 8.
    Abdallah, A.E., et al., Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure. J. Theor. Appl. Inf. Technol. 417–423 (2015)Google Scholar
  9. 9.
    Song, G., Ji, Z.: Anonymous-address-resolution model. Front. Inf. Technol. Electron. Eng. 17(10), 1044–1055 (2016)CrossRefGoogle Scholar
  10. 10.
    Nam, S.Y., Djuraeva, S., Park, M.: Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks. Comput. Netw. 57(18), 3866–3884 (2013)Google Scholar
  11. 11.
    Song, M.S., Lee, J.D., Jeong, Y.-S., Jeong, H.-Y., Park, J.H.: DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. Hindawi Publishing Corporation, Scientific World Journal Volume, Article ID 264654, 7 p. (2014)Google Scholar
  12. 12.
    Hu, X., Ma, L., Huang, S., Huang, T., Liu, S.: Dynamic channel slot allocation scheme and performance analysis of cyclic quorum multichannel MAC protocol. Mathematical Problems in Engineering, vol. 2017, Article ID 8580913, 16 p. (2017)Google Scholar
  13. 13.
    Febrianto, T., Hou, J., Shikh-Bahaei, M.: Cooperative full-duplex physical and MAC layer design in asynchronous cognitive networks. Hindawi Wireless Communications and Mobile Computing, vol. 2017, Article ID 8491920, 14 p. (2017)Google Scholar
  14. 14.
    Xu, Y., Sun, S.: The study on the college campus network ARP deception defense. Institute of Electrical and Electronics Engineers(IEEE) (2010)Google Scholar
  15. 15.
    Ismail Al-Sulaifanie, A., Biswas, S., Al-Sulaifanie, B.: AH-MAC: adaptive hierarchical MAC protocol for low-rate wireless sensor network applications. J. Sens. Article no 8105954 (2017)Google Scholar
  16. 16.
    Sheng, Y., et al.: Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. In: Proceedings of the 27th Conference on IEEE INFOCOM 2008 (2008)Google Scholar
  17. 17.
    Alotaibi, B., Elleithy, K.: A new MAC address spoofing detection technique based on random forests. Sensors (Basel) (2016) (March)Google Scholar
  18. 18.
    Satheeskumar, R., Periasamy, P.S.: Quality of service improvement in wireless mesh networks using time variant traffic approximation technique. J. Comput. Theor. Nanosci. 5226–5232 (2017)Google Scholar
  19. 19.
    Durairaj, M., Persia, A.: ThreV—an efficacious algorithm to Thwart MAC spoof DoS attack in wireless local area infrastructure network. Indian J. Sci. Technol. 7(5), 39–46 (2014)Google Scholar
  20. 20.
    Assels, M.J., Paquet, J., Debbabi, M.: Toward automated MAC spoofer investigations. In: Proceedings of the 2014 International Conference on Computer Science & Software Engineering, Article No. 27. ACM DL (2014)Google Scholar
  21. 21.
    Bansal, R., Bansal, D.: Non-cryptographic methods of MAC spoof detection in wireless LAN. In: IEEE International Conference on Networks (2008)Google Scholar
  22. 22.
    Huang, I.-H., Chang, K.-C., Yang, C.-Z.: 2014, Countermeasures against MAC address spoofing in public wireless networks using lightweight agents. In: International Conference on Wireless Internet, 1–3 March 2010Google Scholar
  23. 23.
    Hou, X., Jiang, Z., Tian, X.: The detection and prevention for ARP Spoofing based on Snort. In: Proceedings of the International Conference on Computer Application and System Modeling, vol. 9 (2010)Google Scholar
  24. 24.
    Arote, P., Arya, K.V.: Detection and prevention against ARP poisoning attack using modified ICMP and voting. In: Proceedings of the International Conference on Computational Intelligence and Networks. IEEE Explore (2015)Google Scholar
  25. 25.
    Raviya Rupal, D., et al.: Detection and prevention of ARP poisoning in dynamic IP configuration. In: Proceedings of the IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology. IEEE Explore (2016)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceChrist UniversityBengaluruIndia

Personalised recommendations