Vakaliuk, T. and Trokoz, Y. and Pokotylo, O. and Osadchyi, Viacheslav and Bolotina, V. (2024) Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy CPITS 2024 - Cybersecurity Providing in Information and Telecommunication Systems, 3654. pp. 376-383.
![]() |
Text
V_Osadchyi_PITS_2024_2_FEU.pdf Download (1MB) |
Abstract
The article discusses various types of attacks on the ARP protocol and the tools used to implement and detect them. The principal network vulnerabilities related to the lack of authentication and encryption were identified through modeling, and methods to prevent or reduce the risk were proposed. A network design was created in the GNS3 environment, which is as close to the real environment as possible. Specialized tools such as Nping, Arpspoof, and Ettercap were used to carry out the ARP-Flooding, ARP-Spoofing, and ARP-Poisoning attacks, and XArp software was used for detection.
Item Type: | Article |
---|---|
Uncontrolled Keywords: | ARP; GNS3; attack emulation; ARP-flooding; ARP-spoofing; ARP-poisoning. |
Subjects: | Статті у базах даних > Scopus |
Divisions: | Факультет економіки та управління > Кафедра управління |
Depositing User: | доцент Оксана В'ячеславівна Марухленко |
Date Deposited: | 11 Dec 2024 09:06 |
Last Modified: | 11 Dec 2024 09:06 |
URI: | https://elibrary.kubg.edu.ua/id/eprint/50569 |
Actions (login required)
![]() |
View Item |