S-ARP: a secure address resolution protocol

Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests we...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bruschi, D., Ornaghi, A., Rosti, E.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 74
container_issue
container_start_page 66
container_title
container_volume
creator Bruschi, D.
Ornaghi, A.
Rosti, E.
description Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.
doi_str_mv 10.1109/CSAC.2003.1254311
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_1254311</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>1254311</ieee_id><sourcerecordid>1254311</sourcerecordid><originalsourceid>FETCH-LOGICAL-i218t-306dd3dd56fa5dda98e87ceabe609a10ac344e3dcd838453af85798a7dec03543</originalsourceid><addsrcrecordid>eNotj0FLw0AQhRdEUGp-QPGSuyTOZnazu95CUCsUFFvPZdyZQCSakk0P_nsD9h3ed3t8T6m1hlJrCPftrmnLCgBLXVmDWl-oLDgPrg62AqPNlcpS-oIlxhqH-lrd7Yrm_e0hpzxJPE2SE_MkKeVLjcNp7sef_DiN8xjH4UZddjQkyc5cqY-nx327Kbavzy9tsy36Svu5QKiZkdnWHVlmCl68i0KfUkMgDRTRGEGO7NEbi9R564InxxIBF--Vuv3f7UXkcJz6b5p-D-dL-AeMtUCJ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>S-ARP: a secure address resolution protocol</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Bruschi, D. ; Ornaghi, A. ; Rosti, E.</creator><creatorcontrib>Bruschi, D. ; Ornaghi, A. ; Rosti, E.</creatorcontrib><description>Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.</description><identifier>ISBN: 9780769520414</identifier><identifier>ISBN: 0769520413</identifier><identifier>DOI: 10.1109/CSAC.2003.1254311</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Certification ; Communication system security ; Cryptography ; Electronic mail ; Ethernet networks ; Internet ; Local area networks ; Message authentication ; Protection</subject><ispartof>19th Annual Computer Security Applications Conference, 2003. Proceedings, 2003, p.66-74</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/1254311$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,4036,4037,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/1254311$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bruschi, D.</creatorcontrib><creatorcontrib>Ornaghi, A.</creatorcontrib><creatorcontrib>Rosti, E.</creatorcontrib><title>S-ARP: a secure address resolution protocol</title><title>19th Annual Computer Security Applications Conference, 2003. Proceedings</title><addtitle>CSAC</addtitle><description>Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.</description><subject>Access protocols</subject><subject>Certification</subject><subject>Communication system security</subject><subject>Cryptography</subject><subject>Electronic mail</subject><subject>Ethernet networks</subject><subject>Internet</subject><subject>Local area networks</subject><subject>Message authentication</subject><subject>Protection</subject><isbn>9780769520414</isbn><isbn>0769520413</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2003</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj0FLw0AQhRdEUGp-QPGSuyTOZnazu95CUCsUFFvPZdyZQCSakk0P_nsD9h3ed3t8T6m1hlJrCPftrmnLCgBLXVmDWl-oLDgPrg62AqPNlcpS-oIlxhqH-lrd7Yrm_e0hpzxJPE2SE_MkKeVLjcNp7sef_DiN8xjH4UZddjQkyc5cqY-nx327Kbavzy9tsy36Svu5QKiZkdnWHVlmCl68i0KfUkMgDRTRGEGO7NEbi9R564InxxIBF--Vuv3f7UXkcJz6b5p-D-dL-AeMtUCJ</recordid><startdate>2003</startdate><enddate>2003</enddate><creator>Bruschi, D.</creator><creator>Ornaghi, A.</creator><creator>Rosti, E.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>2003</creationdate><title>S-ARP: a secure address resolution protocol</title><author>Bruschi, D. ; Ornaghi, A. ; Rosti, E.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i218t-306dd3dd56fa5dda98e87ceabe609a10ac344e3dcd838453af85798a7dec03543</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2003</creationdate><topic>Access protocols</topic><topic>Certification</topic><topic>Communication system security</topic><topic>Cryptography</topic><topic>Electronic mail</topic><topic>Ethernet networks</topic><topic>Internet</topic><topic>Local area networks</topic><topic>Message authentication</topic><topic>Protection</topic><toplevel>online_resources</toplevel><creatorcontrib>Bruschi, D.</creatorcontrib><creatorcontrib>Ornaghi, A.</creatorcontrib><creatorcontrib>Rosti, E.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library Online</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bruschi, D.</au><au>Ornaghi, A.</au><au>Rosti, E.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>S-ARP: a secure address resolution protocol</atitle><btitle>19th Annual Computer Security Applications Conference, 2003. Proceedings</btitle><stitle>CSAC</stitle><date>2003</date><risdate>2003</risdate><spage>66</spage><epage>74</epage><pages>66-74</pages><isbn>9780769520414</isbn><isbn>0769520413</isbn><abstract>Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the Internet. Such tools use the address resolution protocol (ARP) poisoning technique, which relies on hosts caching reply messages even though the corresponding requests were never sent. Since no message authentication is provided, any host of the LAN can forge a message containing malicious information. We present a secure version of ARP that provides protection against ARP poisoning. Each host has a public/private key pair certified by a local trusted party on the LAN, which acts as a certification authority. Messages are digitally signed by the sender, thus preventing the injection of spurious and/or spoofed information. As a proof of concept, the proposed solution was implemented on a Linux box. Performance measurements show that PKI based strong authentication is feasible to secure even low level protocols, as long as the overhead for key validity verification is kept small.</abstract><pub>IEEE</pub><doi>10.1109/CSAC.2003.1254311</doi><tpages>9</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9780769520414
ispartof 19th Annual Computer Security Applications Conference, 2003. Proceedings, 2003, p.66-74
issn
language eng
recordid cdi_ieee_primary_1254311
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Access protocols
Certification
Communication system security
Cryptography
Electronic mail
Ethernet networks
Internet
Local area networks
Message authentication
Protection
title S-ARP: a secure address resolution protocol
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-07T16%3A23%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=S-ARP:%20a%20secure%20address%20resolution%20protocol&rft.btitle=19th%20Annual%20Computer%20Security%20Applications%20Conference,%202003.%20Proceedings&rft.au=Bruschi,%20D.&rft.date=2003&rft.spage=66&rft.epage=74&rft.pages=66-74&rft.isbn=9780769520414&rft.isbn_list=0769520413&rft_id=info:doi/10.1109/CSAC.2003.1254311&rft_dat=%3Cieee_6IE%3E1254311%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=1254311&rfr_iscdi=true