Have a personal or library account? Click to login
Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks Cover

Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks

By: B. Prabadevi and  N. Jeyanthi  
Open Access
|Nov 2017

Abstract

The bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first packet generated during any TCP/IP communications and they are the first traffic from the host. In the large data center, as the size of the broadcast domain (i.e., number of hosts on the network) increases consequently the broadcast traffic from the communication protocols like ARP also increases. This paper addresses the problem faced by Layer 2 protocols like insecured communication, scalability issues and VM migration issues. The proposed system addresses these issues by introducing two new types of messaging with traditional ARP and also combat the ARP Cache poisoning attacks like host impersonation, MITM, Distributed DoS by making ARP stateful. The components of the proposed methodology first start the process by decoding the packets, updates the invalid entry made by the user with Timestamp feature and messages being introduced. The system has been implemented and compared with various existing solutions.

DOI: https://doi.org/10.1515/cait-2017-0042 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 69 - 86
Published on: Nov 30, 2017
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2017 B. Prabadevi, N. Jeyanthi, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.