版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
1、.外文翻譯原文及譯文學 院計算機學院專 業(yè)計算機科學與技術(shù)班 級84010101學 號2008040101023姓 名王冉指導教師高利軍負責教師高利軍沈陽航空航天大學2011年6月*;沈陽航空航天大學畢業(yè)設(shè)計(論文)外文翻譯原文Detecting ARP Spoofing: An Active TechniqueVivek Ramachandran and Sukumar NandiCisco Systems, Inc., Bangalore IndiaIndian Institute of Technology, Guwahati, Assam, IndiaAbstract. The Add
2、ress Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man
3、in the middle and session hijacking. The current methods of detection use a passive approach, monitoring the ARP traffic and looking for inconsistencies in the Ethernet to IP address mapping. The main drawback of the passive approach is the time lag between learning and detecting spoofing. This some
4、times leads to the attack being discovered long after it has been orchestrated. In this paper, we present an active technique to detect ARP spoofing. We inject ARP request and TCP SYN packets into the network to probe for inconsistencies. This technique is faster, intelligent, scalable and more reli
5、able in detecting attacks than the passive methods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degree of accuracy in the event of an actual attack.1. IntroductionThe ARP protocol is one of the most basic but essential protocols for LAN communication. The ARP pr
6、otocol is used to resolve the MAC address of a host given its IP address. This is done by sending an ARP request packet (broadcasted) on the network. The concerned host now replies back with its MAC address in an ARP reply packet (unicast). In some situations a host might broadcast its own MAC addre
7、ss in a special Gratuitous ARP packet. All hosts maintain an ARP cache where all address mappings learnt from the network (dynamic entries) or configured by the administrator (static entries) are kept. The dynamic entries age out after a fixed interval of time, which varies across operating systems.
8、 After the entry ages out it is deleted from the cache and if the host wants to communicate with the same peer, another ARP request is made. The static entries never age out. The ARP protocol is stateless. Hosts will cache all ARP replies sent to them even if they had not sent an explicit ARP reques
9、t for it. Even if a previous unexpired dynamic ARP entry is there in the ARP cache it will be overwritten by a newer ARP reply packet on most operating systems. All hosts blindly cache the ARP replies they receive, as they have no mechanism to authenticate their peer. This is the root problem, which
10、 leads to ARP spoofing.ARP spoofing is the process of forging ARP packets to be able to impersonate another host on the network. In the most general form of ARP spoofing the attacker sends spoofed ARP responses to the victim periodically. The period between the spoofed responses is much lesser than
11、the ARP cache entry timeout period for the operating system running on the victim host. This will ensure that the victim host would never make an ARP request for the host whose address the attacker is impersonating. Following subsection briefly discuss the current detection and mitigation techniques
12、. 1.1 Current Mitigation and Detection TechniquesExisting ARP spoofing detection techniques are discussed next sequentially.1.1.1 Secure ARP Protocol (S-ARP)This has been proposed as a replacement for the ARP protocol in S-ARP: a Secure Address Resolution Protocol. The S-ARP protocol is definitely a
13、 permanent solution to ARP spoofing but the biggest drawback is that we will have to make changes to the network stack of all the hosts. This is not very scalable as going for a stack upgrade across all available operating systems is something both vendors and customers will not be happy about. As S
14、-ARP uses Digital Signature Algorithm (DSA) we have the additional overhead of cryptographic calculations though the authors of the paper have claimed that this overhead is not significant.1.1.2 Static MAC EntriesAdding static MAC addresses on every host for all other hosts will not allow spoofing b
15、ut is not a scalable solution at all and managing all these entries is a full time job by itself. This can fail miserably if mobile hosts such as laptops are periodically introduced into the network. Also some operating systems are known to overwrite static ARP entries if they receive Gratuitous ARP
16、 packets (GARP).1.1.3 Kernel Based PatchesKernel based patches such as Anticap and Antidote have made an attempt to protect from ARP spoofing at a individual host level. Anticap does not allow updating of the host ARP cache by an ARP reply that carries a different MAC address then the one already in
17、 the cache. This unfortunately makes it drop legal gratuitous ARP replies as well, which is a violation to the ARP protocol specification. Antidote on receiving an ARP reply whose MAC address differs from the previously cached one tries to check if the previously learnt MAC is still alive. If the pr
18、eviously learnt MAC is still alive then the update is rejected and the offending MAC address is added to a list of banned addresses.Both the above techniques rely on the fact that the ARP entry in the cache is the legitimate one. This creates a race situation between the attacker and the victim. If
19、the attacker gets his spoofed ARP entry into the hosts cache before the real host can, then the real MAC address is banned. This can only be undone by administrative intervention. Thus we can conclude that wrong learning may cause these tools to fail in detecting ARP spoofing.1.1.4 Passive Detection
20、In Passive Detection we sniff the ARP requests/responses on the network and construct a MAC address to IP address mapping database. If we notice a change in any of these mappings in future ARP traffic then we raise an alarm and conclude that an ARP spoofing attack is underway. The most popular tool
21、in this category is ARPWATCH.The main drawback of the passive method is a time lag between learning the address mappings and subsequent attack detection. In a situation where the ARP spoofing began before the detection tool was started for the first time, the tool will learn the forged replies in it
22、s IP to MAC address mapping database. Now only after the victim starts communicating with some other host the inconsistency will be detected and an alarm rose. The attacker may have made his getaway because of this delay. Also a spoofed entry learned as in the above scenario would have to be manuall
23、y undone by the network administrator. The only solution to this problem is to manually feed the correct address mappings into the database before starting the tool or create an attack free learning traffic. Both of these are unreasonable due to scalability and mobility issues. An ideal example woul
24、d be mobile hosts e.g. laptops brought in by customers or visitors to a company. This slow learning curve makes it impossible to install passive tools on a large network (1000+ hosts) and expect them to identify attacks instantaneously.The passive techniques do not have any intelligence and blindly
25、look for a mismatch in the ARP traffic with their learnt database tables. If an ARP spoofing is detected than there is no way of ascertaining if the newly seen address mapping is because of a spoofing attempt or the previously learnt one was actually a spoofed one. Our technique will determine the r
26、eal MAC to IP mapping during an actual attack to a fair degree of accuracy.The passive learning technique is also very unreliable. A new address mapping is learnt when ARP traffic is seen from them. Thus a switch ARP Cache table overflow attempt by the generation of random ARP reply packets per seco
27、nd with arbitrary MAC and IP addresses will just result in new stations being discovered instead of being reported as attack traffic. To overcome problems in earlier techniques, we present a new ARP spoofing detection technique. Our technique uses an active approach to detect ARP spoofing. We send o
28、ut ARP request and TCP SYN packets to probe the authenticity of the ARP traffic we see in the network. The approach is faster, intelligent, scalable and more reliable in detecting attacks than the passive methods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degr
29、ee of accuracy in the event of an actual attack. A description of the technique in detail is reported in following sections.2 The Proposed Active Detection Technique for ARP spoofingThe proposed technique actively interacts with the network to gauge the presence of ARP spoofing attacks. We will henc
30、eforth assume the following about the network we desire to protect.2.1 Assumptions1. The attackers computer has a normal network stack. This assumption will hold for most of the attacks as “ready to use” ARP spoofing tools have always been the attackers most popular choice. If the attacker does use
31、a customized stack then our technique will still detect ARP spoofing but will not be able to predict the correct address mappings anymore. We will discuss performance in the presence of a customized stack in section 2.5.2. The individual hosts we desire to protect on the network may use a personal f
32、irewall but at least one TCP port should be allowed through the firewall. This is to allow our probe packets (TCP SYN packets) to go through. This is a reasonable assumption as even if a firewall is installed some LAN based services such as NETBIOS etc are normally allowed through it for LAN communi
33、cation.3. We assume that all devices, which we protect, have a TCP/IP network stack up and running.2.2 TerminologyWe now introduce the terminology used in the rest of this paper.1. Threshold interval: ARP replies to an ARP request must be received within a specified time interval. After this time ha
34、s elapsed we will consider the ARP request to have “expired”. We will call this interval as the “Threshold Interval”. This will be administratively configurable on any tool using our technique.2. Host Database: This is the mapping of all legitimate IP and MAC pairs on the network verified and learnt
35、 by our technique.The ARP packets consist of the MAC header and the ARP header. Based on the value of the source and destination MAC addresses in the MAC header and as advertised in the ARP header we can divide the all ARP packets into 2 categories.1. Inconsistent Header ARP packets: The MAC address
36、es in the MAC and ARP header differ i.e. Source MAC address in MAC header! = Source MAC address in ARP header (in ARP requests/responses) and/or Destination MAC address in MAC header! = Destination address in ARP header (only for ARP replies).2. Consistent Header ARP packets: These are the complimen
37、t of the Inconsistent Header ARP packets. The MAC addresses in the MAC and ARP headers match in these packets.Note that Inconsistent Header ARP packets are guaranteed spoofed packets as such an anomaly is only possible in attack traffic. Based on the above classification we can further bunch the Con
38、sistent Header ARP packets into three groups:1. Full ARP Cycle: An ARP request and its corresponding ARP replies seen within the threshold interval.2. Request Half Cycle: An ARP request for which no replies are sent as seen within the threshold time.3. Response Half Cycle: An ARP reply generated wit
39、hout an ARP request. These three categories form the basis of our input to the ARP spoofing detection mechanism. The following subsection discusses the Architecture of the proposed technique in detail. 2.3 ArchitecturePlease refer to Figure 1 for the architecture discussion. We have adopted a modula
40、rized approach and have divided our spoof detection into the following modules:1. ARP Sniffer module: This sniffs all ARP traffic from the network.2. MAC - ARP header anomaly detector module: This module classifies the ARP traffic into Inconsistent Header ARP packets and Consistent Header ARP packet
41、s.3. Known Traffic Filter module: This filters all the traffic, which is already learnt. It will either drop the packet if the IP to MAC mapping is coherent with the learnt Host Database or raise an alarm if there are any contradictions. All the new ARP packets with unknown addresses are sent to the
42、 Spoof Detection Engine for verification.4. Spoof Detection Engine module: This is the main detection engine. We feed the Consistent Header ARP packets to it as input. The design of this module will be discussed in Section 2.4.5. Add to Database Module: Legitimate ARP entries verified by the Spoof D
43、etection Engine are added to the Host Database by this module.6. Spoof Alarm Module: This module raises an alarm on detection of ARP spoofing by sending a mail, SMS etc to the administrator.Fig. 1. Inter-relation between various Modules used by the ARP Spoof Detection AlgorithmAs shown in Figure 1,
44、the ARP Sniffer module sniffs all the ARP traffic in its LAN segment and passes it to the MAC ARP Header Anomaly Detector. This module passes the entire Consistent Header ARP packets to the Known Traffic Filter module. The entire Inconsistent Header ARP packets are sent to the Spoof Alarm. This is d
45、one because the Inconsistent Header ARP packets are all spoofed packets as discussed earlier. The Known Traffic Filter module will remove all traffic coherent with the already learnt addresses by consulting the Host Database. If there is a contradiction in the ARP traffic for already learnt addresse
46、s then it raises a Spoof Alarm. All new ARP traffic is passed to the Spoof Detection Engine.The Spoof Detection Engine applies our detection algorithm to detect ARP spoofing. The newly seen Consistent Header ARP packets are input to this module. The engine now internally bunches these packets into t
47、he three categories discussed in Section 2.2 namely Full ARP Cycle, Request and Response Half Cycle packets. The detection algorithm applied by the engine will be discussed in the section 2.4. After applying the detection algorithm the Spoof Detection engine either sends the ARP entry to the Add to
48、Database module or the Spoof Alarm module. The Add to Database module will add these verified MAC and IP address mapping to the Host Database. The spoof detection engine is discussed in detail next.2.4The Spoof Detection EngineThe Spoof Detection Engine is the heart of the whole system. The three di
49、fferent ARP Cycle packets as discussed in Section 2.2 are treated in slightly different ways by the Spoof Detection Engine to detect an attempted spoofing. The Spoof Detection Engine works based on the following Rules:Rule A: “The network interface card of a host will accept packets sent to its MAC
50、address, Broadcast address and subscribed multicast addresses. It will pass on these packets to the IP layer. The IP layer will only accept IP packets addressed to its IP address(s) and will silently discard the rest of the packets. If the accepted packet is a TCP packet it is passed on to the TCP l
51、ayer. If a TCP SYN packet is received then the host will either respond back with a TCP SYN/ACK packet if the destination port is open or with a TCP RST packet if the port is closed”.Rule B: “The attacker can spoof ARP packets impersonating a host but he can never stop the real host from replying to
52、 ARP requests (or any other packet) sent to it. The valid assumption here is that the real host is up on the network.”It should be noted that these rules have been derived from the correct behavior that a hosts network stack should exhibit when it receives a packet. To exemplify Rule A, let a host h
53、ave MAC address = X and IP address = Y. If this host receives a packet with destination MAC address = X and destination IP address = Z then even though the network interface card would accept the packet as the destination MAC address matches, the hosts network stack will silently discard this packet
54、 as the destination IP address does not match, without sending any error messages back to the source of the packet.Based on Rule A, we can conceive of two types of probe packets from a hosts network stack point of view which we will use to detect ARP spoofing. a. Right MAC Wrong IP packet: The desti
55、nation MAC address in the packet is of the host but the IP address is invalid and does not correspond to any of the hosts addresses. The destination host will silently drop this packet.b. Right MAC Right IP packet: The destination MAC address and IP addresses pairs are of the hosts and its network s
56、tack accepts it.We will henceforth assume that the attacker is using an unmodified network stack. The performance of our technique in the presence of a modified network stack will be evaluated in Section 2.5. Based on the above observation we will construct our own packets based on Rule A and send t
57、hem on the network. We will use the address information in the ARP response packet sent by the host whose authenticity is to be verified. We will use the MAC and IP addresses used in the ARP response packet to construct a TCP SYN packet i.e. the destination MAC and IP in the TCP SYN packet will be t
58、he source MAC and IP address advertised in the ARP response packet and the source MAC and IP in the TCP SYN packet would be of the host running the Spoof Detection Engine. The TCP destination port will be chosen based on the presence/absence of packet filtering firewalls on the network hosts. If there is a firewall installed on the hosts we will choose the “allowed TCP port” (as in section 2.1) and if no firewalls are there then we can choose any TCP port. The rest of the header values in the TCP SYN packet will be set as usual.When a TCP SYN packet as constru
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 廣東司法警官職業(yè)學院《Thermo-fluids》2023-2024學年第一學期期末試卷
- 廣東石油化工學院《藝術(shù)教育概覽》2023-2024學年第一學期期末試卷
- 廣東生態(tài)工程職業(yè)學院《統(tǒng)計軟件操作》2023-2024學年第一學期期末試卷
- 廣東青年職業(yè)學院《營銷業(yè)務實訓》2023-2024學年第一學期期末試卷
- 廣東梅州職業(yè)技術(shù)學院《機器人教育》2023-2024學年第一學期期末試卷
- 一年級數(shù)學計算題專項練習匯編
- 防震減災工作總結(jié)5篇
- 電氣工程師工作總結(jié)
- 【名師金典】2022新課標高考生物總復習限時檢測21染色體變異和人類遺傳病-
- 【名師一號】2020-2021學年蘇教版化學檢測題-選修四:《專題2-化學反應速率與化學平衡》
- 2024年紙張銷售合同
- 手動及手持電動工具培訓考核試卷
- 2024年湖北省公務員錄用考試《行測》真題及答案解析
- 自然辯證法習題及答案
- 特色農(nóng)產(chǎn)品超市方案
- 2024國有企業(yè)與民營企業(yè)之間的混合所有制改革合同
- 物流倉庫安全生產(chǎn)
- 2024年醫(yī)院食堂餐飲獨家承包協(xié)議
- 保險公司廉政風險防控制度
- DB34T4868-2024智慧醫(yī)院醫(yī)用耗材院內(nèi)物流規(guī)范
- 2025年蛇年年會匯報年終總結(jié)大會模板
評論
0/150
提交評論