首页> 外文期刊>IT Professional >A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack
【24h】

A Precise Model to Secure Systems on Ethernet Against Man-In-The-Middle Attack

机译:一种精确的模型,可以保护以太网对中间攻击的攻击系统

获取原文
获取原文并翻译 | 示例
           

摘要

Internet protocol (IP) is a part of the Transmission Control Protocol (TCP)/IP suite that operates below the network layer of the Open Systems Interconnection (OSI) reference model and is employed as an interface between the network and data link layer. The address resolution protocol (ARP) is a protocol used by IP for mapping an IP address to the corresponding media access control address that is a hardware address harnessed to identify the source and destination of each frame sent on the Ethernet. The man-in-the-middle (MITM) attack is a kind of the Ethernet attack that can be carried out depending on ARP cache-memory poisoning to intercept communications between two systems on Ethernet, and it could, without difficulty, be applied when the attacker is in control of a router along normal point of traffic. To secure systems on Ethernet as well as to prevent ARP cache-memory poisoning, it is necessary to have a good prevention model of MITM attacks. In this article, using the client/server-based intrusion detection system (CSIDS), a precise model to prevent ARP poisoning attacks is proposed and implemented. Our analysis is adequately characterized by implementing a real-time analysis for the received ARP packets, and in the case of detection of a suspicious ARP packet, a resolution message will be exchanged between system parts on the same network. To evaluate the ability of detection and prevention of CSIDS, we design and implement a novel protocol. At the same time, we compare the performance between CSIDS with the standard operations of ARP. Our experimental results reveal that our methodology completely protects hosts against cache poisoning attacks. We further show the effectiveness of our technique in identifying the abnormal ARP packets.
机译:Internet协议(IP)是在开放系统互连(OSI)参考模型的网络层下方运行的传输控制协议(TCP)/ IP套件的一部分,并且被用作网络和数据链路层之间的接口。地址解析协议(ARP)是IP用于将IP地址映射到相应媒体访问控制地址的IP,该协议是利用以在以太网上发送的每个帧的源和目的地映射的硬件地址。中间人(MITM)攻击是一种以太网攻击,可以根据ARP缓存记忆中毒中毒来执行,以拦截以太网上的两个系统之间的通信,并且可以毫无困难地应用攻击者沿正常流量控制路由器。为了防止以太网安全系统,以防止ARP缓存记忆中毒,有必要具有良好的预防MITM攻击模型。在本文中,使用基于客户/服务器的入侵检测系统(CSID),提出并实施了一种预防ARP中毒攻击的精确模型。我们的分析通过实现所接收的ARP分组的实时分析,并且在检测到可疑ARP数据包的情况下,在同一网络上的系统部分之间将交换分辨率消息。为了评估检测和预防CSID的能力,我们设计并实施一种新的协议。与此同时,我们将CSID与ARP的标准操作进行比较。我们的实验结果表明,我们的方法完全保护宿主免受缓存中毒攻击。我们进一步展示了我们在识别异常ARP数据包时的有效性。

著录项

  • 来源
    《IT Professional》 |2021年第1期|72-85|共14页
  • 作者

    Salim Haider; Li Zhitang;

  • 作者单位

    AI Kunooze Univ Coll Comp Engn Dept Basra Iraq;

    Huazhong Univ Sci & Technol Wuhan Peoples R China;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号