Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy

Vakaliuk, T. та Trokoz, Y. та Pokotylo, O. та Osadchyi, Viacheslav та Bolotina, V. (2024) Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy CPITS 2024 - Cybersecurity Providing in Information and Telecommunication Systems, 3654. с. 376-383.

[thumbnail of V_Osadchyi_PITS_2024_2_FEU.pdf] Текст
V_Osadchyi_PITS_2024_2_FEU.pdf

Download (1MB)
Офіційне посилання: https://ceur-ws.org/Vol-3654/

Анотація

The article discusses various types of attacks on the ARP protocol and the tools used to implement and detect them. The principal network vulnerabilities related to the lack of authentication and encryption were identified through modeling, and methods to prevent or reduce the risk were proposed. A network design was created in the GNS3 environment, which is as close to the real environment as possible. Specialized tools such as Nping, Arpspoof, and Ettercap were used to carry out the ARP-Flooding, ARP-Spoofing, and ARP-Poisoning attacks, and XArp software was used for detection.

Тип елементу : Стаття
Ключові слова: ARP; GNS3; attack emulation; ARP-flooding; ARP-spoofing; ARP-poisoning.
Типологія: Статті у базах даних > Scopus
Підрозділи: Факультет економіки та управління > Кафедра управління
Користувач, що депонує: доцент Оксана В'ячеславівна Марухленко
Дата внесення: 11 Груд 2024 09:06
Останні зміни: 11 Груд 2024 09:06
URI: https://elibrary.kubg.edu.ua/id/eprint/50569

Actions (login required)

Перегляд елементу Перегляд елементу