Journal of Information Security

Volume 1, Issue 2 (October 2010)

ISSN Print: 2153-1234   ISSN Online: 2153-1242

Google-based Impact Factor: 3.79  Citations  

Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment

HTML  Download Download as PDF (Size: 437KB)  PP. 88-94  
DOI: 10.4236/jis.2010.12010    9,405 Downloads   17,597 Views  Citations

Affiliation(s)

.

ABSTRACT

ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.

Share and Cite:

S. Kumar and O. Gomez, "Denial of Service Due to Direct and Indirect ARP Storm Attacks in LAN Environment," Journal of Information Security, Vol. 1 No. 2, 2010, pp. 88-94. doi: 10.4236/jis.2010.12010.

Cited by

[1] Cyber Security Evaluation of CentOS Red Hat Based Operating System Under Cyber Attack with Increasing Magnitude
2020
[2] Can Routers Provide Sufficient Protection against Cyber Security Attacks?
2019
[3] Security Integrity of Data Collection from Smart Electric Meter under a Cyber Attack
2019
[4] Evaluation of Internet Connectivity Under Distributed Denial of Service Attacks from Botnets of Varying Magnitudes
2018
[5] Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification
2018
[6] Security Evaluation of Virtualized Computing Platforms
ProQuest Dissertations Publishing, 2017
[7] An Efficient DDoS TCP Flood Attack Detection and Prevention System in a Cloud Environment
2017
[8] PERANCANGAN DAN IMPLEMENTASI NETWORK MONITORING SYSTEM PADA JARINGAN LAN (LOCAL AREA NETWORK) DENGAN NOTIFIKASI PADA MEDIA SOSIAL TWITTER
2016
[9] Generátor kybernetických útoků
2016
[10] Security novel risk assessment framework based on reversible metrics: a case study of DDoS attacks on an E‐commerce web server
International Journal of Network Management, 2016
[11] Doctorat ParisTech
2015
[12] Techniques for efficient and fault-tolerant geo-replication
2015
[13] A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues
2014
[14] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZESTĘPCZOŚCIĄ INTERNETOWĄ.
2014
[15] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZESTĉPCZOĝCIĄ INTERNETOWĄ
2014
[16] ANALIZA STRAT EKONOMICZNYCH SPOWODOWANYCH PRZEST?PCZO?CI? INTERNETOW?
Studia i Materialy Polskiego Stowarzyszenia Zarzadzania Wiedza/Studies & Proceedings Polish Association for Knowledge Management, 2014
[17] 사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰
한국경호경비학회지, 2014
[18] THE CHANGING FACE OF CYBERCRIME: HOW MOBILE DEVICES HAVE CHANGED THE APPROACH TO COMMITTING CYBERCRIME
2014
[19] End-User Awareness of and Adherence to Crisis Preparedness of the Information Systems in New Zealand Organisations
2013
[20] Implementation of Echo State Neural Network and Radial Basis Function Network for Intrusion Detection
Data Mining and Knowledge Engineering, 2013
[21] Enhance the Security and Performance of IP over Ethernet Networks by Reduction the Naming System Design
WK Alzubaidi, L Cai, SA Alyawer - cscjournals.org, 2012
[22] Microsoft vs. Apple: Resilience against Distributed Denial-of-Service Attacks
Security & Privacy, IEEE, 2012
[23] 一种基于第三方确认的防ARP 欺骗的方法
科技创业月刊, 2012
[24] A Subnet Based Intrusion Detection Scheme for Tracking down the Origin of Man-In-The-Middle Attack
International Journal of Computer Science Issues (IJCSI), 2011
[25] Arp storm detection and prevention measures
International Journal of Computer Science Issues, 2011

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.