Publication:
Securing Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Application

dc.contributor.authorPonpat Phetchaien_US
dc.contributor.authorJema David Ndibwileen_US
dc.contributor.authorDoudou Fallen_US
dc.contributor.authorShigeru Kashiharaen_US
dc.contributor.authorSuppawong Tuaroben_US
dc.contributor.otherNara Institute of Science and Technologyen_US
dc.contributor.otherMahidol Universityen_US
dc.date.accessioned2019-08-23T10:55:33Z
dc.date.available2019-08-23T10:55:33Z
dc.date.issued2018-08-21en_US
dc.description.abstract© 2017 IEEE. ARP spoofing is one of the most common attacks in the network and it has been around for quite some time. It is one of the simplest attacks to launch and most difficult to defend. The attacking simplicity is due to ARP stateless nature, i.e., lacks an ARP reply authentication for a subsequent request. Moreover, the attack is convenient because of the vast amount of free online spoofing tools. Many solutions have been developed to address this issue; however, most of them suffer from a single point of failure (SPOF), high-computational overhead and unsuitability for low-computational-power devices such as smartphones. In this paper, we propose a solution for protecting those devices from the ARP spoofing attacks. Our solution is lightweight, scalable and immune to SPOF. The solution is fundamentally based on the followed concept: a legitimate ARP cache mapping of a device is replicated and saved to a secure long-term application memory, then later it periodically checks against the ARP cache map to determine the alteration and alert the user, so that appropriate actions can be taken. The results of our experiment show that the proposed solution significantly prevents the ARP spoofing attacks with a low-computational overhead on mobile devices while consuming less than 0.60% and 7.83% memory and CPU usage respectively.en_US
dc.identifier.citationICSEC 2017 - 21st International Computer Science and Engineering Conference 2017, Proceeding. (2018), 157-162en_US
dc.identifier.doi10.1109/ICSEC.2017.8443953en_US
dc.identifier.other2-s2.0-85053468465en_US
dc.identifier.urihttps://repository.li.mahidol.ac.th/handle/123456789/45597
dc.rightsMahidol Universityen_US
dc.rights.holderSCOPUSen_US
dc.source.urihttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053468465&origin=inwarden_US
dc.subjectComputer Scienceen_US
dc.titleSecuring Low-Computational-Power Devices Against ARP Spoofing Attacks Through a Lightweight Android Applicationen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
mu.datasource.scopushttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85053468465&origin=inwarden_US

Files

Collections