Paper
28 October 2022 ARP spoofing forensics based on network data flow
Lin Zhu, Binglong Li D.D.S., Heyu Zhang
Author Affiliations +
Proceedings Volume 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022); 1245307 (2022) https://doi.org/10.1117/12.2659380
Event: Third International Conference on Computer Communication and Network Security (CCNS 2022), 2022, Hohhot, China
Abstract
Among the many network protocols, the protocol responsible for obtaining the Mac address based on the IP address is called the Address Resolution Protocol (ARP). Since the ARP protocol is a stateless protocol and lacks an authentication mechanism for the data source of the request/response signal, any client can forge malicious ARP packets to poison the ARP cache table of the target host. Attacks based on ARP spoofing are very harmful, and will lead to reduced network transmission efficiency, network congestion, and even user information theft and privacy leakage. This paper uses wireshark software to view network traffic, and analyzes the implementation principles and characteristics of man-in-the-middle attacks (MITM), denial of service attacks (DoS), and MAC flooding based on ARP spoofing. A forensic method for ARP spoofing attack based on network data flow analysis is proposed.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Lin Zhu, Binglong Li D.D.S., and Heyu Zhang "ARP spoofing forensics based on network data flow", Proc. SPIE 12453, Third International Conference on Computer Communication and Network Security (CCNS 2022), 1245307 (28 October 2022); https://doi.org/10.1117/12.2659380
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Forensic science

Content addressable memory

Inspection

Network security

Analytical research

Computer networks

Digital forensics

RELATED CONTENT

VAFLE: visual analytics of firewall log events
Proceedings of SPIE (February 03 2014)
Quantification of moving target cyber defenses
Proceedings of SPIE (May 23 2015)
The forensic validity of visual analytics
Proceedings of SPIE (January 28 2008)
How to improve MEBES III Write times by improving your...
Proceedings of SPIE (December 08 1995)

Back to Top