A Survey on ARP Poisoning

  • Suma B Mehta Student of MCA, Dept. of CS & IT, Jain (Deemed-to-be-University), Bengaluru, India
  • A. Rengarajan Professor, Dept. of CS & IT, Jain (Deemed-to-be-University), Bengaluru, India
Keywords: ARP, ARP Poisoning, Attack Types, Detection, Inspection Tools, Manual Detection, Avoiding Methods, Comparison of ARP Poisoning Countermeasures

Abstract

This paper's primary goal is to examine the detection and mechanism of ARP spoofing. One may argue that the Address Resolution Protocol, or ARP for simple terms, is crucial to computer science and forensics. ARP spoofing is one of the various computers hacking techniques used nowadays by individuals to transmit phony ARP packets across a Local Area Network (LAN). Such attacks might lead to changes in traffic patterns or, worse yet, a temporary or permanent stoppage of traffic. Even though this attack is only possible on networks with Address Resolution Protocols, ARP spoofing can be a precursor to more dangerous assaults that have the potential to do considerably more harm. An attacker seeking to launch this sort of attack will search for the Address Resolution Protocol's vulnerabilities. He may, for instance, be trying to take advantage of flaws like the message's inability to properly verify the sender. Because of this, hackers may find it very simple to alter or steal users' data. Because ARP spoofing poses a genuine risk to the security of every user on the network, all appropriate precautions must be taken to minimize harm.
Published
2024-02-25