![網絡安全外文翻譯APR欺騙檢測:一種主動技術手段_第1頁](http://file3.renrendoc.com/fileroot_temp3/2022-5/2/db44db60-09a6-4224-827f-452eac6fc1dd/db44db60-09a6-4224-827f-452eac6fc1dd1.gif)
![網絡安全外文翻譯APR欺騙檢測:一種主動技術手段_第2頁](http://file3.renrendoc.com/fileroot_temp3/2022-5/2/db44db60-09a6-4224-827f-452eac6fc1dd/db44db60-09a6-4224-827f-452eac6fc1dd2.gif)
![網絡安全外文翻譯APR欺騙檢測:一種主動技術手段_第3頁](http://file3.renrendoc.com/fileroot_temp3/2022-5/2/db44db60-09a6-4224-827f-452eac6fc1dd/db44db60-09a6-4224-827f-452eac6fc1dd3.gif)
![網絡安全外文翻譯APR欺騙檢測:一種主動技術手段_第4頁](http://file3.renrendoc.com/fileroot_temp3/2022-5/2/db44db60-09a6-4224-827f-452eac6fc1dd/db44db60-09a6-4224-827f-452eac6fc1dd4.gif)
![網絡安全外文翻譯APR欺騙檢測:一種主動技術手段_第5頁](http://file3.renrendoc.com/fileroot_temp3/2022-5/2/db44db60-09a6-4224-827f-452eac6fc1dd/db44db60-09a6-4224-827f-452eac6fc1dd5.gif)
版權說明:本文檔由用戶提供并上傳,收益歸屬內容提供方,若內容存在侵權,請進行舉報或認領
文檔簡介
1、外文翻譯原文及譯文學院計算機學院專 業(yè)計算機科學與技術班 級84010101學 號2008040101023姓 名王冉指導教師高利軍負責教師高利軍沈陽航空航天大學2011年6月Detecting ARPSpoofing: An ActiveTechniqueVivek Ramachandran and SukumarNandiCisco Systems, Inc., BangaloreIndiaIndian Institute of Technology,Guwahati, Assam, IndiaAbstract.TheAddressResolutionProtocol (ARP) due
2、to its statelessness and lack of anauthentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking.
3、 Thecurrent methods of detection use a passive approach, monitoring the ARP trafficand lookingforinconsistencies inthe Ethernet to IP address mapping. The main drawback of the passive approach is the time lag between learning and detecting spoofing. Thissometimes leads to the attack being discovered
4、 long after it has been orchestrated.In this paper, we present an active technique to detect ARP spoofing. We inject ARP request and TCP SYN packets into the network to probe for inconsistencies. This technique is faster, intelligent, scalable and more reliable in detectingattacks than the passive m
5、ethods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degree of accuracy in the event of an actual attack.1. IntroductionThe ARP protocol is one of the most basic but essential protocols for LAN communication. The ARP protocol is used to resolvetheMAC address of a
6、 host given its IP address. This is done by sending an ARPrequestpacket (broadcasted) on the network. The concerned host now replies back with its MAC address in an ARP reply packet (unicast). In some situations a host might broadcast its own MAC address in a special Gratuitous ARP packet. All hosts
7、 maintain an ARP cache where all address mappings learnt from the network (dynamic entries) or configured by the administrator (static entries) are kept. The dynamic entries age out after a fixed interval of time, which varies across operating systems. After the entry ages out it is deleted from the
8、 cache and if the host wants to communicate with the same peer, another ARP request is made. The static entries never age out. The ARP protocol is stateless. Hosts will cache all ARP replies sent to them even if they had not sent an explicit ARP request for it. Even if a previous unexpired dynamic A
9、RP entry is there in the ARP cache it will be overwritten by a newer ARP reply packet on most operating systems. All hosts blindly cache the ARP replies they receive, as they have no mechanism to authenticate their peer. This is the root problem, which leads to ARP spoofing.ARP spoofing is the proce
10、ss of forging ARP packets to be able to impersonateanother host on thenetwork. In the most general form of ARP spoofingthe attacker sends spoofed ARP responses to the victim periodically.The period between the spoofed responses is much lesser than the ARP cache entry timeout period for the operating
11、 system running on the victim host. This will ensure that the victim host would never make an ARP request for the host whose address the attacker isimpersonating. Following subsectionbriefly discuss the current detection and mitigation techniques. 1.1 Current Mitigation and Detection TechniquesExist
12、ing ARP spoofing detection techniques are discussed next sequentially.Secure ARP Protocol (S-ARP)This has been proposed as a replacement for the ARP protocol in S-ARP: a Secure Address Resolution Protocol. The S-ARPprotocol is definitely apermanentsolution to ARP spoofing but the biggest drawback is
13、 that we will have to make changes to the network stack of all the hosts. This is not very scalable as going for a stack upgrade across all available operating systems is something both vendors and customers will not behappy about.As S-ARP uses Digital Signature Algorithm (DSA) we have the additiona
14、l overheadof cryptographic calculationsthough the authors of the paper haveclaimed that thisoverhead is notsignificant.Static MAC EntriesAdding static MAC addresses on every hostfor all other hosts will not allow spoofing but is not a scalable solutionat all and managing all these entries is a full
15、time job by itself. This can fail miserably if mobile hosts such as laptops are periodically introduced into the network. Also some operating systems are known to overwrite static ARP entries if they receive Gratuitous ARP packets (GARP).Kernel Based PatchesKernel based patches such as AnticapandAnt
16、idote have made an attempt to protect from ARP spoofing at a individual host level. Anticapdoes not allow updating of the host ARP cache by an ARP reply that carries a different MAC address then the one already in the cache. This unfortunately makes it drop legal gratuitous ARP replies as well, whic
17、h is a violation to the ARP protocol specification. Antidoteon receiving an ARP reply whose MAC address differsfrom the previously cached one tries tocheck if the previously learnt MAC is still alive. If the previously learnt MAC is still alive then the update is rejected and the offending MAC addre
18、ss is added to a list of banned addresses.Both the above techniques rely on the fact that the ARP entry in the cache is the legitimate one. This creates a race situation between the attacker andthe victim.If the attacker gets his spoofed ARP entry into the hosts cache before the real host can, then
19、the real MAC address is banned.This can only be undone by administrative intervention. Thus we can conclude that wrong learning may cause these tools to fail in detecting ARP spoofing.Passive DetectionIn Passive Detection we sniff the ARP requests/responses on the network and construct a MAC address
20、 to IP address mapping database. Ifwenotice a change in any ofthese mappings in future ARP traffic then we raise an alarm andconclude that an ARP spoofing attack is underway.The most popular tool in this category is ARPWATCH.The main drawback of the passive method is a time lag between learning the
21、address mappings and subsequent attack detection. In a situation where the ARP spoofing began before the detection tool was started for the first time, the tool will learn the forged replies in its IP to MAC address mapping database. Now only after the victim starts communicating with some other hos
22、t the inconsistency will be detected and an alarm rose. The attacker may have made his getaway because of this delay. Also a spoofed entry learned as in the above scenario would have to be manually undone by the network administrator. The only solution to this problem is to manually feed the correct
23、 address mappings intothe database before starting the tool or create an attack free learning traffic. Both of these are unreasonable due to scalability and mobility issues. An ideal example would be mobile hosts e.g. laptops brought in by customers or visitors to a company. This slow learning curve
24、 makes itimpossible to install passive tools on a large network (1000+ hosts) and expectthem to identify attacks instantaneously.The passive techniques do not have any intelligence and blindly look for a mismatch in the ARP traffic with their learnt database tables. If an ARP spoofing is detected th
25、an there is no way of ascertaining if the newly seen address mapping is because of a spoofing attempt or the previously learntone was actually a spoofed one. Our technique will determine the real MAC to IP mapping during an actual attack to a fair degree of accuracy.The passive learning technique is
26、 also very unreliable. A new address mapping is learnt when ARP traffic is seen from them. Thus a switch ARP Cache table overflow attempt by the generation of random ARP reply packets per second with arbitrary MAC and IP addresses will just result in new stations being discovered instead of being re
27、ported as attack traffic. To overcome problemsin earlier techniques, we present a new ARP spoofing detection technique. Our technique uses an active approach to detect ARP spoofing. We send out ARP request and TCP SYN packets to probe the authenticity of the ARP traffic we see in the network. The ap
28、proach is faster, intelligent, scalable and more reliable in detecting attacks than the passive methods. It can also additionally detect the real mapping of MAC to IP addresses to a fair degree of accuracy in the event of an actual attack. A description of the technique in detail is reported in foll
29、owing sections.2 The Proposed Active Detection Technique for ARP spoofingThe proposed technique actively interacts with the network togauge thepresence of ARP spoofing attacks. We will henceforth assume the following about the network we desire to protect.2.1 Assumptions1. The attackers computer has
30、 a normal network stack. This assumption will hold for most of the attacks as “ready to use” ARP spoofing tools have always been the attackers most popular choice. If the attacker does use a customized stack then our technique will still detect ARP spoofing but willnotbe able to predict the correct
31、address mappings anymore.We will discuss performance in the presence of a customized stack in section 2.5.2. The individual hosts we desire to protect on the network may use a personal firewall but at least one TCP port should be allowed through the firewall. This is to allow our probe packets (TCP
32、SYN packets) to go through. This is a reasonable assumption as even if a firewall is installed some LAN based services such as NETBIOS etc are normally allowed through it for LAN communication.3. We assume that all devices, which we protect, have a TCP/IP network stack up and running.2.2 Terminology
33、We now introduce the terminology used in the rest of this paper.1. Threshold interval: ARP replies to an ARP request must be received within a specified time interval. After this time has elapsed we will consider the ARP request to have “expired”.We willcall this interval as the “Threshold Interval”
34、. This will be administratively configurable on any tool using our technique.2. Host Database: This is the mapping of all legitimate IP and MAC pairs on the network verified and learnt by our technique.The ARP packets consist of the MAC header and the ARP header.Based on the value of the source and
35、destination MAC addresses in the MAC header and as advertised in the ARPheader we can divide the all ARP packets into 2 categories.1. Inconsistent Header ARP packets: The MAC addresses in the MAC and ARP header differ i.e. Source MAC address in MAC header! = Source MAC address in ARP header (in ARP
36、requests/responses) and/or Destination MAC address in MAC header! = Destination address in ARP header (only for ARP replies).2. Consistent Header ARP packets: These are the compliment of the Inconsistent Header ARP packets. The MAC addresses in the MAC and ARP headers match in these packets.Note tha
37、t Inconsistent Header ARP packets are guaranteed spoofed packets as such an anomaly is only possible in attack traffic. Based on the above classification we can further bunch the Consistent Header ARP packets into three groups:1. Full ARP Cycle: An ARP request andits corresponding ARP replies seen w
38、ithin the threshold interval.2. Request Half Cycle: An ARP request for which no replies are sent as seen within the threshold time.3. Response Half Cycle: An ARP reply generated without an ARP request. These three categories form the basis of our input to the ARP spoofing detection mechanism. The fo
39、llowing subsection discusses the Architecture of the proposed technique in detail. 2.3 ArchitecturePlease refer to Figure 1 for the architecture discussion. We have adopted a modularized approach and have divided our spoof detection into the following modules:1. ARP Sniffer module: This sniffs all A
40、RP traffic from the network.2. MAC - ARP header anomaly detector module: This module classifies the ARP traffic into Inconsistent Header ARP packets and Consistent Header ARP packets.3. Known Traffic Filter module: Thisfilters all the traffic, which is already learnt. It will either drop the packet
41、if the IP to MAC mapping is coherent with the learnt Host Database or raise an alarm if there are any contradictions. All the new ARP packets with unknown addresses are sent to the Spoof Detection Engine for verification.4. Spoof Detection Engine module: This is the main detection engine. We feed th
42、e Consistent Header ARP packets to it as input. The design of this module will be discussed in Section 2.4.5. Add to Database Module: Legitimate ARP entries verified by the SpoofDetection Engine are added to the Host Database by this module.6. Spoof Alarm Module: This module raises an alarm on detec
43、tionof ARPspoofing by sending a mail, SMS etc to the administrator.Fig.1. Inter-relation between various Modules used by the ARP Spoof Detection AlgorithmAs shown in Figure 1, the ARP Sniffer module sniffs all the ARP traffic in its LAN segment and passes it to the MAC ARP Header Anomaly Detector. T
44、his module passes the entire Consistent Header ARP packets to the Known TrafficFiltermodule. The entire Inconsistent Header ARP packets are sent to the Spoof Alarm. This is done because the Inconsistent Header ARP packets are all spoofed packets as discussed earlier. The Known Traffic Filter module
45、will remove all traffic coherent with the already learnt addresses by consulting the Host Database. If there is a contradiction in the ARP traffic for already learnt addresses then it raises a Spoof Alarm. All new ARP traffic is passed to the Spoof Detection Engine.The Spoof Detection Engine applies
46、 our detection algorithm to detect ARP spoofing. The newly seen Consistent Header ARP packets are input to this module. The engine now internally bunches these packets into the three categories discussed in Section 2.2 namely Full ARP Cycle, Request and Response Half Cycle packets. The detection alg
47、orithm applied by the engine will be discussed in the section 2.4. After applying the detection algorithm the Spoof Detection engine either sends the ARP entry to the Add to Database module or the Spoof Alarm module. The Add toDatabase module will add these verified MAC and IP address mapping to the
48、 Host Database. The spoof detection engine is discussed in detail next.2.4The Spoof Detection EngineThe Spoof DetectionEngine is the heart of the whole system. The three different ARPCycle packetsas discussedin Section2.2 are treated in slightlydifferent ways by the Spoof DetectionEngine to detect a
49、n attempted spoofing. The Spoof DetectionEngineworks based on the following Rules:Rule A: “The network interface card of a host will accept packets sent to its MAC address, Broadcast address and subscribed multicast addresses. It will pass on these packets to the IP layer. The IP layer will only acc
50、ept IP packets addressed to its IP address(s) and will silently discard the rest of the packets. If the accepted packet is a TCP packet it is passed on to the TCP layer. If a TCP SYN packet is received then the host will either respond back with a TCP SYN/ACK packet if the destination port is open o
51、r with a TCP RST packet if the port is closed”.Rule B: “The attacker can spoof ARP packets impersonating a host but he can never stop the real host from replying to ARP requests (or any other packet) sent to it. The valid assumption here is that the real host is up on the network.”It should be noted
52、 that these rules have been derived from the correct behavior that a hosts network stack should exhibit when it receives a packet. To exemplify Rule A, let a host have MAC address = X and IP address = Y. If this host receives a packet with destination MAC address = X and destination IP address= Z th
53、en even though the network interface card would accept the packet as the destination MAC address matches, the hosts network stack will silently discard this packet as the destination IP address does not match, without sending any error messages back to the source of the packet.Based on Rule A, we ca
54、n conceive of two types of probe packets from a hosts network stack point of view which we will use to detect ARP spoofing.a. Right MAC Wrong IP packet: The destination MAC address in the packet is of the host but the IP address is invalid and does not correspond to any of the hosts addresses. The d
55、estination host will silently drop this packet.b. Right MAC Right IP packet: The destination MAC address and IP addresses pairs are of the hosts and its network stack accepts it.We will henceforth assume that the attacker is using an unmodified network stack. The performance of our technique in the
56、presence of a modified network stack will be evaluated in Section 2.5. Based on the above observation we will construct our own packets based on Rule A and send them on the network. We will use the address information in the ARP response packet sent by the host whose authenticity is to be verified.
57、We will use the MAC and IP addresses used in the ARP response packet to construct a TCP SYN packet i.e. the destination MAC and IP in the TCP SYN packet will be the source MAC and IP address advertised in the ARP response packet and the source MAC and IP in the TCP SYN packet would be of the host ru
58、nning the Spoof Detection Engine. The TCP destination port will be chosen based on the presence/absence of packet filteringfirewalls on the network hosts. If there is a firewall installed on the hosts we will choose the “allowed TCP port” (as in section 2.1) and if no firewalls are there then we can
59、 choose any TCP port. The rest of the header values in the TCP SYN packet will be set as usual.When a TCP SYN packet as constructed above is sent to the source of the ARP reply packet, the hosts response will be based on Rule A. If the ARP response was from the real host its IP stack will respond bac
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯系上傳者。文件的所有權益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網頁內容里面會有圖紙預覽,若沒有圖紙預覽就沒有圖紙。
- 4. 未經權益所有人同意不得將文件中的內容挪作商業(yè)或盈利用途。
- 5. 人人文庫網僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對用戶上傳分享的文檔內容本身不做任何修改或編輯,并不能對任何下載內容負責。
- 6. 下載文件中如有侵權或不適當內容,請與我們聯系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 服裝批發(fā)居間合同委托書
- 知識產權運營股權居間合同
- 專業(yè)運動器材銷售與推廣合同
- 弱電項目總結
- 游戲規(guī)則與操作指南發(fā)布平臺建設作業(yè)指導書
- 農業(yè)產業(yè)鏈社會責任履行實戰(zhàn)指導書
- 三農村集體資產管理方案
- 體育訓練與比賽作業(yè)指導書
- 安能轉讓合同
- 消防安全技術服務項目合同
- 房地產行業(yè)房地產銷售業(yè)績考核方案
- 小兒腹瀉課件
- 北京市通州區(qū)市級名校2025屆高一數學第一學期期末考試試題含解析
- Unit2 Travelling Around Project北京之游學生作業(yè)教學設計 -2023-2024學年高中英語人教版必修第一冊
- 工業(yè)機器人仿真軟件:Epson RC+ Simulator:機器人基本操作:EpsonRC+Simulator界面介紹
- 項目三任務1:認識超聲波雷達(課件)
- 起重機械生產單位質量安全總監(jiān)-特種設備考試題庫
- DZ∕T 0080-2010 煤炭地球物理測井規(guī)范(正式版)
- 小學生心理健康教育學情分析
- 2024年高考語文一輪復習:文言文文意概括簡答題知識清單 (二)
- 康復科工作計劃及實施方案
評論
0/150
提交評論