Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy

Vakaliuk, T. and Trokoz, Y. and Pokotylo, O. and Osadchyi, Viacheslav and Bolotina, V. (2024) Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy CPITS 2024 - Cybersecurity Providing in Information and Telecommunication Systems, 3654. pp. 376-383.

[thumbnail of V_Osadchyi_PITS_2024_2_FEU.pdf] Text
V_Osadchyi_PITS_2024_2_FEU.pdf

Download (1MB)

Abstract

The article discusses various types of attacks on the ARP protocol and the tools used to implement and detect them. The principal network vulnerabilities related to the lack of authentication and encryption were identified through modeling, and methods to prevent or reduce the risk were proposed. A network design was created in the GNS3 environment, which is as close to the real environment as possible. Specialized tools such as Nping, Arpspoof, and Ettercap were used to carry out the ARP-Flooding, ARP-Spoofing, and ARP-Poisoning attacks, and XArp software was used for detection.

Item Type: Article
Uncontrolled Keywords: ARP; GNS3; attack emulation; ARP-flooding; ARP-spoofing; ARP-poisoning.
Subjects: Статті у базах даних > Scopus
Divisions: Факультет економіки та управління > Кафедра управління
Depositing User: доцент Оксана В'ячеславівна Марухленко
Date Deposited: 11 Dec 2024 09:06
Last Modified: 11 Dec 2024 09:06
URI: https://elibrary.kubg.edu.ua/id/eprint/50569

Actions (login required)

View Item View Item