ArpON
Encyclopedia
ArpON is a computer software
Computer software
Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it....

 project to improve network security.

Motivation

The Address Resolution Protocol
Address Resolution Protocol
Address Resolution Protocol is a telecommunications protocol used for resolution of network layer addresses into link layer addresses, a critical function in multiple-access networks. ARP was defined by RFC 826 in 1982. It is Internet Standard STD 37...

 (ARP) has security issues. These include the Man In The Middle
Man in the middle
Man in the middle may refer to:* Man-in-the-middle attack, a form of cryptographic attack* Man in the Middle , a 1963 movie* Man In The Middle , a memoir of basketballer John Amaechi-In music:...

 (MITM) attack through ARP Spoofing
ARP spoofing
ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

, ARP Cache Poisoning or ARP Poison Routing (APR
APR
- In the context of organizations :*Agrarian Party of Russia, a left-wing political party in Russia*Alabama Public Radio*American Public Radio, now Public Radio International*Asia-Pacific Scout Region...

) attacks. ArpON also blocks derived attacks including Sniffing, Hijacking, Injection
Injection
Injection or Injected may refer to:* Injection , insertion of liquid into the body with a syringe* Injective function in mathematics, a function mapping distinct arguments to distinct values...

, Filtering attacks and complex derived attacks, as: DNS Spoofing, WEB Spoofing, Session Hijacking
Session hijacking
In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a...

 and SSL/TLS Hijacking attacks.

This is possible using three kinds of anti ARP Spoofing techniques.
ArpON requires a daemon in every host to be authenticated.
It does not modify the classic ARP standard base protocol defined by IETF, but rather sets precise policies for static networks, dynamic networks and hybrid networks.

ArpON does not use a centralized server or encryption. It uses a cooperative authentication between the hosts based on the policies that all hosts with ArpON must respect. These policies allow exactly total protection by these attacks for all hosts that use ArpON.

Features

Some of ArpON's features are:
  • Support for interfaces: Ethernet
    Ethernet
    Ethernet is a family of computer networking technologies for local area networks commercially introduced in 1980. Standardized in IEEE 802.3, Ethernet has largely replaced competing wired LAN technologies....

    , Wireless
    Wireless
    Wireless telecommunications is the transfer of information between two or more points that are not physically connected. Distances can be short, such as a few meters for television remote control, or as far as thousands or even millions of kilometers for deep-space radio communications...

  • Manages the network interface with: Unplug iface, Boot OS, Hibernation OS, Suspension OS
  • Proactive based solution for connections: Point-to-Point
    Point-to-point
    Point-to-point or point to point may refer to:Computing* Point-to-point construction, an electronics assembly technique* Point-to-point * Point-to-Point Protocol , part of the Internet protocol suite...

    , Point-to-Multipoint
    Point-to-multipoint
    Point-to-multipoint communication is a term that is used in the telecommunications field which refers to communication which is accomplished via a specific and distinct type of one-to-many connection, providing multiple paths from a single location to multiple locations.Point-to-multipoint is often...

    , Multipoint
    Multipoint
    Multipoint may refer to:* Multi-point fuel injection, an injection scheme for metering fuel into an internal combustion engine* Multipoint ground, a type of electrical installation which involves the creation of many alternate paths for electrical energy to find its way back to ground* Multipoint...

  • Type of authentication for host: Cooperative between the hosts
  • Support for networks: Statically, Dynamically (DHCP), Hybrid network that is statically and dynamically
  • Retro compatible with: Classic ARP
    Arp
    -People:* Halton Arp , American astronomer* Jean Arp , German-French artist* Sophie Taeuber-Arp , Swiss artist* Axel Rudi Pell , German guitarist-Businesses and organizations:...

     standard base protocol by IETF
  • Support of Gratuitous ARP
    Arp
    -People:* Halton Arp , American astronomer* Jean Arp , German-French artist* Sophie Taeuber-Arp , Swiss artist* Axel Rudi Pell , German guitarist-Businesses and organizations:...

     request and reply for: Failover Cluster, Cluster with load-balancing, High-Availability (HA) Cluster
  • Blocks the Man In The Middle
    Man in the middle
    Man in the middle may refer to:* Man-in-the-middle attack, a form of cryptographic attack* Man in the Middle , a 1963 movie* Man In The Middle , a memoir of basketballer John Amaechi-In music:...

     (MITM
    MITM
    MITM may refer to:* Man-in-the-middle attack, a computer networking attack method* Meet-in-the-middle attack, a cryptographic attack method* Malcolm in the Middle, is an American comedy television series* Man in the Mirror, is a song by Michael Jackson...

    ) attack through: ARP Spoofing
    ARP spoofing
    ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

    , ARP Cache Poisoning, ARP Poison Routing (APR
    APR
    - In the context of organizations :*Agrarian Party of Russia, a left-wing political party in Russia*Alabama Public Radio*American Public Radio, now Public Radio International*Asia-Pacific Scout Region...

    )
  • Three kinds of anti ARP Spoofing
    ARP spoofing
    ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

     tecniques: SARPI
    Sarpi
    Sarpi is a border village on the coast of the Black Sea, on the border between Turkey and Georgia. It is inhabited by the Laz.Sarpi is the main land border crossing between the two countries and a major conduit for business travel, especially for Turkish companies doing business in Batumi...

     or Static ARP Inspection, DARPI or Dynamic ARP Inspection, HARPI or Hybrid ARP Inspection
  • Blocks the derived attacks: Sniffing, Hijacking, Injection
    Injection
    Injection or Injected may refer to:* Injection , insertion of liquid into the body with a syringe* Injective function in mathematics, a function mapping distinct arguments to distinct values...

    , Filtering & co attacks
  • Blocks the complex derived attacks: DNS Spoofing, WEB Spoofing, Session Hijacking
    Session hijacking
    In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a...

    , SSL/TLS Hijacking & co attacks
  • Tested against: Ettercap
    Ettercap
    An ettercap is one of a race of bestial spider-men aberrations in the Dungeons & Dragons game.-Publication history:The name is derived from the Danish word for spider, edderkop, and is related to attercop, an archaic word for poisonous spider, used in J.R.R...

    , Cain & Abel, DSniff
    DSniff
    Dsniff is a password sniffer written by Dug Song and a package of utilities that parse many different application protocols and extract interesting information....

    , Yersinia
    Yersinia
    Yersinia is a genus of bacteria in the family Enterobacteriaceae. Yersinia are Gram-negative rod shaped bacteria, a few micrometers long and fractions of a micrometer in diameter, and are facultative anaerobes. Some members of Yersinia are pathogenic in humans; in particular, Y. pestis is the...

    , scapy
    Scapy
    Scapy is a packet manipulation tool for computer networks, written in Python by Philippe Biondi. It can forge or decode packets, send them on the wire, capture them, and match requests and replies...

    , netcut, Metasploit, arpspoof, sslsniff, sslstrip & co tools

Static ARP Inspection

SARPI detects and blocks Man In The Middle
Man in the middle
Man in the middle may refer to:* Man-in-the-middle attack, a form of cryptographic attack* Man in the Middle , a 1963 movie* Man In The Middle , a memoir of basketballer John Amaechi-In music:...

 (MITM
MITM
MITM may refer to:* Man-in-the-middle attack, a computer networking attack method* Meet-in-the-middle attack, a cryptographic attack method* Malcolm in the Middle, is an American comedy television series* Man in the Mirror, is a song by Michael Jackson...

) attack through ARP Spoofing
ARP spoofing
ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

, ARP Cache Poisoning, ARP Poison Routing (APR
APR
- In the context of organizations :*Agrarian Party of Russia, a left-wing political party in Russia*Alabama Public Radio*American Public Radio, now Public Radio International*Asia-Pacific Scout Region...

) attacks and it is countermeasure against these attacks and the derived attacks by it, which Sniffing, Hijacking, Injection
Injection
Injection or Injected may refer to:* Injection , insertion of liquid into the body with a syringe* Injective function in mathematics, a function mapping distinct arguments to distinct values...

, Filtering & co attacks for more complex derived attacks, as: DNS Spoofing, WEB Spoofing, Session Hijacking
Session hijacking
In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a...

 and SSL/TLS Hijacking & co attacks.

SARPI manages a list with static entries, for statically configured networks without DHCP.

Dynamic ARP Inspection

DARPI detects and blocks Man In The Middle
Man in the middle
Man in the middle may refer to:* Man-in-the-middle attack, a form of cryptographic attack* Man in the Middle , a 1963 movie* Man In The Middle , a memoir of basketballer John Amaechi-In music:...

 (MITM
MITM
MITM may refer to:* Man-in-the-middle attack, a computer networking attack method* Meet-in-the-middle attack, a cryptographic attack method* Malcolm in the Middle, is an American comedy television series* Man in the Mirror, is a song by Michael Jackson...

) attack through ARP Spoofing
ARP spoofing
ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

, ARP Cache Poisoning, ARP Poison Routing (APR
APR
- In the context of organizations :*Agrarian Party of Russia, a left-wing political party in Russia*Alabama Public Radio*American Public Radio, now Public Radio International*Asia-Pacific Scout Region...

) attacks and it is countermeasure against these attacks and the derived attacks by it, which Sniffing, Hijacking, Injection
Injection
Injection or Injected may refer to:* Injection , insertion of liquid into the body with a syringe* Injective function in mathematics, a function mapping distinct arguments to distinct values...

, Filtering & co attacks for more complex derived attacks, as: DNS Spoofing, WEB Spoofing, Session Hijacking
Session hijacking
In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a...

 and SSL/TLS Hijacking attacks.

DARPI manages uniquely a list with dynamic entries so can be used in dynamically configured networks having DHCP.

Hybrid ARP Inspection

HARPI detects and blocks Man In The Middle
Man in the middle
Man in the middle may refer to:* Man-in-the-middle attack, a form of cryptographic attack* Man in the Middle , a 1963 movie* Man In The Middle , a memoir of basketballer John Amaechi-In music:...

 (MITM
MITM
MITM may refer to:* Man-in-the-middle attack, a computer networking attack method* Meet-in-the-middle attack, a cryptographic attack method* Malcolm in the Middle, is an American comedy television series* Man in the Mirror, is a song by Michael Jackson...

) attack through ARP Spoofing
ARP spoofing
ARP spoofing, also known as ARP cache poisoning or ARP poison routing , is a technique used to attack a local-area network . ARP spoofing may allow an attacker to intercept data frames on a LAN, modify the traffic, or stop the traffic altogether...

, ARP Cache Poisoning, ARP Poison Routing (APR
APR
- In the context of organizations :*Agrarian Party of Russia, a left-wing political party in Russia*Alabama Public Radio*American Public Radio, now Public Radio International*Asia-Pacific Scout Region...

) attacks and it is countermeasure against these attacks and the derived attacks by it, which Sniffing, Hijacking, Injection
Injection
Injection or Injected may refer to:* Injection , insertion of liquid into the body with a syringe* Injective function in mathematics, a function mapping distinct arguments to distinct values...

, Filtering & co attacks for more complex derived attacks, as: DNS Spoofing, WEB Spoofing, Session Hijacking
Session hijacking
In computer science, session hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. In particular, it is used to refer to the theft of a magic cookie used to authenticate a user to a...

 and SSL/TLS Hijacking & co attacks.

HARPI manages two lists simultaneously: a list with static entries and a list with dynamic entries for networks with statically and dynamically (DHCP) configured addresses.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK