Attack on the Address Resolution Protocol

The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effec...

Full description

Saved in:
Bibliographic Details
Published in2020 International Conference Engineering and Telecommunication (En&T) pp. 1 - 3
Main Authors Stepanov, Petr, Nikonova, Galina, Pavlychenko, Tatyana, Gil, Anatoly
Format Conference Proceeding
LanguageEnglish
Published IEEE 25.11.2020
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The article covers such an attack as Address Resolution Protocol (ARP) spoofing, and its implementation using the scapy software. Such attacks are of rather dangerous type since they are based on the flaws of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of effects on the attacked node are given. An example of the script that sends a fake ARP packet is proposed.
DOI:10.1109/EnT50437.2020.9431297