Font Size: a A A

The Research And Implementation Of Arp Attack Prevention Technology

Posted on:2014-02-25Degree:MasterType:Thesis
Country:ChinaCandidate:Z B ZhuFull Text:PDF
GTID:2248330395983418Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the wide application of computer network technology, computer network has penetrated into all aspects of social life. It is profoundly changing the way of our lives, working and learning. However, all kinds of network attacks have become an increasingly prominent problem at the same time. They not only damage the security of information, but also threat the safety of people’s property, how to solve the problem of network attacks reasonably has great significances.ARP protocol is one of the basic protocols for the network operation, and it is used to transform the IP address into MAC address. But there is a defect in protocol that is the protocol does not verify the source of ARP packet, leading to defending the ARP attacks becomes a difficult job. If we can solve the problem of ARP attack, the network can run safely, orderly and effectively in a certain extent.This paper introduces the ARP protocol firstly, including ARP packet, its working principles and its working flaws. Secondly, it discusses a variety of ARP attacks deeply, including working principles, applicable environment and hazards of each attack. Thirdly, it carefully analyses the existing defense methods, including the principles, the applicable environment, advantages and the disadvantages of these defence methods. Then, it proposes and designs several defence methods that can be used in switches and routers, such as gateway protection, active acknowledgment, ARP detection, packet limitation and so on, and implements them on the V7platform of H3C. Finally, it carries out some experiments to test the proposed methods. And after testing, these methods can protect against all kinds of ARP attacks stably and effectively, thus provide a feasible solution to make sure the network security.
Keywords/Search Tags:Network Security, LAN, ARP attack, ARP defence
PDF Full Text Request
Related items