Publication: Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
Issued Date
2018-08-21
Resource Type
Other identifier(s)
2-s2.0-85053468465
Rights
Mahidol University
Rights Holder(s)
SCOPUS
Bibliographic Citation
ICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding. (2018), 157-162
Suggested Citation
Ponpat Phetchai, Jema David Ndibwile, Doudou Fall, Shigeru Kashihara, Suppawong Tuarob Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application. ICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding. (2018), 157-162. doi:10.1109/ICSEC.2017.8443953 Retrieved from: https://repository.li.mahidol.ac.th/handle/123456789/45597
Research Projects
Organizational Units
Authors
Journal Issue
Thesis
Title
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application
Other Contributor(s)
Abstract
© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively.
