DocumentCode :
1610515
Title :
Implementation of a SNORT´s output Plug-In in reaction to ARP Spoofing´s attack
Author :
Boughrara, A. ; Mammar, Said
Author_Institution :
Dept. of Comput. Sci., Univ. of Sci. & the Technol., Oran, Algeria
fYear :
2012
Firstpage :
643
Lastpage :
647
Abstract :
The attacks that exploit the Address Resolution Protocol (ARP) are considered as the most dangerous for the security of networks. Indeed, this attack poisons the cache ARP of the machine and makes possible all the actions of Man In the Middle (reading, modification, denial-of-service). For this, it becomes very important to prevent against this type of attack, by setting up systems able to detect it, known as Intrusion Detection Systems, and to react consequently. Among the existing IDS, we find SNORT which is the most used; but its reactions are generally in a passive way (Log, sending message ...). In this paper, we propose an approach by introducing a Plug-In making SNORT react against ARPSpoofing´s attack in real-time.
Keywords :
computer network security; protocols; ARP spoofing attack; IDS; SNORT; address resolution protocol; intrusion detection systems; network security; output plug-in; Educational institutions; IP networks; Intrusion detection; Network topology; Real-time systems; Toxicology; ArpSpoofing; IDS; Plug-In; SNORT;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on
Conference_Location :
Sousse
Print_ISBN :
978-1-4673-1657-6
Type :
conf
DOI :
10.1109/SETIT.2012.6481988
Filename :
6481988
Link To Document :
بازگشت