• DocumentCode
    1610515
  • Title

    Implementation of a SNORT´s output Plug-In in reaction to ARP Spoofing´s attack

  • Author

    Boughrara, A. ; Mammar, Said

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Sci. & the Technol., Oran, Algeria
  • fYear
    2012
  • Firstpage
    643
  • Lastpage
    647
  • Abstract
    The attacks that exploit the Address Resolution Protocol (ARP) are considered as the most dangerous for the security of networks. Indeed, this attack poisons the cache ARP of the machine and makes possible all the actions of Man In the Middle (reading, modification, denial-of-service). For this, it becomes very important to prevent against this type of attack, by setting up systems able to detect it, known as Intrusion Detection Systems, and to react consequently. Among the existing IDS, we find SNORT which is the most used; but its reactions are generally in a passive way (Log, sending message ...). In this paper, we propose an approach by introducing a Plug-In making SNORT react against ARPSpoofing´s attack in real-time.
  • Keywords
    computer network security; protocols; ARP spoofing attack; IDS; SNORT; address resolution protocol; intrusion detection systems; network security; output plug-in; Educational institutions; IP networks; Intrusion detection; Network topology; Real-time systems; Toxicology; ArpSpoofing; IDS; Plug-In; SNORT;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on
  • Conference_Location
    Sousse
  • Print_ISBN
    978-1-4673-1657-6
  • Type

    conf

  • DOI
    10.1109/SETIT.2012.6481988
  • Filename
    6481988