Skip to main content

Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

  • Conference paper
  • First Online:
Advances in Big Data and Cloud Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 750))

Abstract

Ubiquitous computing is a new paradigm in the world of information technology. Security plays a vital role in such networking environments. However, there are various methods available to generate different Media Access Control (MAC) addresses for the same system, which enables an attacker to spoof into the network. MAC spoofing is one of the major concerns in such an environment where MAC address can be spoofed using a wide range of tools and methods. Different methods can be prioritized to get cache table and attributes of ARP spoofing while targeting the identification of the attack. The routing trace-based technique is the predominant method to analyse MAC spoofing. In this paper, a detailed survey has been done on different methods to detect and prevent such risks. Based on the survey, a new proposal of security architecture has been proposed. This architecture makes use of Monitoring System (MS) that generates frequent network traces into MS table, server data and MS cache which ensures that the MAC spoofing is identified and blocked from the same environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hsiao, H.-W., Lin, C.S., Chang, S.-Y.: Constructing an ARP attack detection system with SNMP traffic data mining. In: Proceedings of the 11th International Conference on Electronic Commerce (ICEC 09). ACM DL (2009)

    Google Scholar 

  2. Kim, J.: IP spoofing detection technique for endpoint security enhancement. J. Korean Inst. Inf. Technol. 75–83 (2017)

    Google Scholar 

  3. Benzaïd, C., Boulgheraif, A., Dahmane, F.Z., Al-Nemrat, A., Zeraoulia, K.: Intelligent detection of MAC spoofing attack in 802.11 network. In: ’16 Proceedings of the 17th International Conference on Distributed Computing and Networking (ICDCN), Article No. 47. ACM (2016)

    Google Scholar 

  4. Asija, M.: MAC address. Int. J. Technol. Eng. IRA (2016). ISSN 2455-4480

    Google Scholar 

  5. Moon, D., Lee, J.D., Jeong, Y.-S., Park, J.H.: RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks. J. Supercomput. 72(5), 1740–1756 (2016)

    Google Scholar 

  6. Tian, D.(J.), Butler, K.R.B., Choi, J., McDaniel, P.D., Krishnaswamy, P.: Securing ARP/NDP from the ground up. IEEE Trans. Inf. Forensics Secur. 12(9), 2131–2143 (2017)

    Google Scholar 

  7. Barbhuiya, F.A.: Detection of neighbor discovery protocol based attacks in IPv6 network. Networking Sci. 2, 91–113 (2013) (Tsinghua University Press and Springer, Berlin)

    Google Scholar 

  8. Abdallah, A.E., et al., Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure. J. Theor. Appl. Inf. Technol. 417–423 (2015)

    Google Scholar 

  9. Song, G., Ji, Z.: Anonymous-address-resolution model. Front. Inf. Technol. Electron. Eng. 17(10), 1044–1055 (2016)

    Article  Google Scholar 

  10. Nam, S.Y., Djuraeva, S., Park, M.: Collaborative approach to mitigating ARP poisoning-based Man-in-the-Middle attacks. Comput. Netw. 57(18), 3866–3884 (2013)

    Google Scholar 

  11. Song, M.S., Lee, J.D., Jeong, Y.-S., Jeong, H.-Y., Park, J.H.: DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. Hindawi Publishing Corporation, Scientific World Journal Volume, Article ID 264654, 7 p. (2014)

    Google Scholar 

  12. Hu, X., Ma, L., Huang, S., Huang, T., Liu, S.: Dynamic channel slot allocation scheme and performance analysis of cyclic quorum multichannel MAC protocol. Mathematical Problems in Engineering, vol. 2017, Article ID 8580913, 16 p. (2017)

    Google Scholar 

  13. Febrianto, T., Hou, J., Shikh-Bahaei, M.: Cooperative full-duplex physical and MAC layer design in asynchronous cognitive networks. Hindawi Wireless Communications and Mobile Computing, vol. 2017, Article ID 8491920, 14 p. (2017)

    Google Scholar 

  14. Xu, Y., Sun, S.: The study on the college campus network ARP deception defense. Institute of Electrical and Electronics Engineers(IEEE) (2010)

    Google Scholar 

  15. Ismail Al-Sulaifanie, A., Biswas, S., Al-Sulaifanie, B.: AH-MAC: adaptive hierarchical MAC protocol for low-rate wireless sensor network applications. J. Sens. Article no 8105954 (2017)

    Google Scholar 

  16. Sheng, Y., et al.: Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. In: Proceedings of the 27th Conference on IEEE INFOCOM 2008 (2008)

    Google Scholar 

  17. Alotaibi, B., Elleithy, K.: A new MAC address spoofing detection technique based on random forests. Sensors (Basel) (2016) (March)

    Google Scholar 

  18. Satheeskumar, R., Periasamy, P.S.: Quality of service improvement in wireless mesh networks using time variant traffic approximation technique. J. Comput. Theor. Nanosci. 5226–5232 (2017)

    Google Scholar 

  19. Durairaj, M., Persia, A.: ThreV—an efficacious algorithm to Thwart MAC spoof DoS attack in wireless local area infrastructure network. Indian J. Sci. Technol. 7(5), 39–46 (2014)

    Google Scholar 

  20. Assels, M.J., Paquet, J., Debbabi, M.: Toward automated MAC spoofer investigations. In: Proceedings of the 2014 International Conference on Computer Science & Software Engineering, Article No. 27. ACM DL (2014)

    Google Scholar 

  21. Bansal, R., Bansal, D.: Non-cryptographic methods of MAC spoof detection in wireless LAN. In: IEEE International Conference on Networks (2008)

    Google Scholar 

  22. Huang, I.-H., Chang, K.-C., Yang, C.-Z.: 2014, Countermeasures against MAC address spoofing in public wireless networks using lightweight agents. In: International Conference on Wireless Internet, 1–3 March 2010

    Google Scholar 

  23. Hou, X., Jiang, Z., Tian, X.: The detection and prevention for ARP Spoofing based on Snort. In: Proceedings of the International Conference on Computer Application and System Modeling, vol. 9 (2010)

    Google Scholar 

  24. Arote, P., Arya, K.V.: Detection and prevention against ARP poisoning attack using modified ICMP and voting. In: Proceedings of the International Conference on Computational Intelligence and Networks. IEEE Explore (2015)

    Google Scholar 

  25. Raviya Rupal, D., et al.: Detection and prevention of ARP poisoning in dynamic IP configuration. In: Proceedings of the IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology. IEEE Explore (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. U. Ullas .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ullas, S.U., Sandeep, J. (2019). Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network. In: Peter, J., Alavi, A., Javadi, B. (eds) Advances in Big Data and Cloud Computing. Advances in Intelligent Systems and Computing, vol 750. Springer, Singapore. https://doi.org/10.1007/978-981-13-1882-5_12

Download citation

Publish with us

Policies and ethics