Vakaliuk, T. та Trokoz, Y. та Pokotylo, O. та Osadchyi, Viacheslav та Bolotina, V. (2024) Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy CPITS 2024 - Cybersecurity Providing in Information and Telecommunication Systems, 3654. с. 376-383.
Текст
V_Osadchyi_PITS_2024_2_FEU.pdf Download (1MB) |
Анотація
The article discusses various types of attacks on the ARP protocol and the tools used to implement and detect them. The principal network vulnerabilities related to the lack of authentication and encryption were identified through modeling, and methods to prevent or reduce the risk were proposed. A network design was created in the GNS3 environment, which is as close to the real environment as possible. Specialized tools such as Nping, Arpspoof, and Ettercap were used to carry out the ARP-Flooding, ARP-Spoofing, and ARP-Poisoning attacks, and XArp software was used for detection.
Тип елементу : | Стаття |
---|---|
Ключові слова: | ARP; GNS3; attack emulation; ARP-flooding; ARP-spoofing; ARP-poisoning. |
Типологія: | Статті у базах даних > Scopus |
Підрозділи: | Факультет економіки та управління > Кафедра управління |
Користувач, що депонує: | доцент Оксана В'ячеславівна Марухленко |
Дата внесення: | 11 Груд 2024 09:06 |
Останні зміни: | 11 Груд 2024 09:06 |
URI: | https://elibrary.kubg.edu.ua/id/eprint/50569 |
Actions (login required)
Перегляд елементу |