An analysis of security solutions for ARP poisoning attacks and its effects on medical computing

  • B. PrabadeviEmail author
  • N. Jeyanthi
  • Ajith Abraham
Original Article


Network utilization reached its maximum level due to the availability of high-end technologies in the least cost. This enabled the network users to share the sensitive information like account details, patient records, genomics details for biomedical research and defence details leading to cyber-war. Data are vulnerable at any level of communication. The link-layer Address Resolution Protocol (ARP) is initiated for any data communication to take place among the hosts in a LAN. Because of the stateless nature of this protocol, it has been misused for illegitimate activities. These activities lead to the most devasting attacks like Denial of Service, Man-in-the-Middle, host impersonation, sniffing, and cache poisoning. Though various host-based and network-based intrusion detection/prevention techniques exist, they fail to provide a complete solution for this type of poisoning. This paper analyzes the existing defence systems against ARP attacks and proposes three different techniques for detecting and preventing the ARP attacks. The three techniques ensure security of traditional ARP and its impact in Medical computing where a single bit inversion could lead to wrong diagnosis.


Address resolution protocol Spoofing Cache poisoning DoS MitM 



  1. Al-Hemairy M, Amin S, Trabelsi Z (2009) Towards more sophisticated ARP spoofing detection/prevention systems in LAN networks. In: 2009 international conference on the current trends in information technology (CTIT), IEEE, pp 1–6Google Scholar
  2. Bidgoli H (2006) Handbook of information security, information warfare, social, legal, and international issues and security foundations, vol 2. Wiley, HobokenGoogle Scholar
  3. Bradley T, Brown C, Malis A (1998) Inverse address resolution protocol (No. RFC 2390)Google Scholar
  4. Bruschi D, Ornaghi A, Rosti E (2003) S-ARP: a secure address resolution protocol. In: Proceedings. 19th annual computer security applications conference, 2003, IEEE, pp 66–74Google Scholar
  5. Cheshire S (2008) IPv4 Address conflict detection, RFC 4227Google Scholar
  6. Dangol S, Selvakumar S, Brindha M (2011) Genuine arp (garp): a broadcast based stateful authentication protocol. ACM SIGSOFT Softw Eng Notes 36(4):1–10CrossRefGoogle Scholar
  7. Hammouda S, Trabelsi Z (2009) An enhanced secure ARP protocol and LAN switch for preveting ARP based attacks. In: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, ACM, pp 942–946Google Scholar
  8. Hingne A, Jain S (2016) A survey on various detection and prevention mechanism for MITM and ARP attacks. Int J Innov Res Comput Commun Eng 4(11):19918–19924Google Scholar
  9. Issac B (2009) Secure ARP and secure DHCP protocols to mitigate security attacks. Int J Netw Secur 8(2):107–118Google Scholar
  10. Jana I (2017) Effect of ARP poisoning attacks on modern operating systems. Inf Secur J A Global Perspect 26(1):1–6CrossRefGoogle Scholar
  11. Kaur J, Dhanda SK (2014) An analysis of local area network ARP spoofing. Int J Latest Trends in Eng Technol 4(3):117–123Google Scholar
  12. Lootah W, Enck W, McDaniel P (2007) TARP: ticket-based address resolution protocol. Comput Netw 51(15):4322–4337CrossRefGoogle Scholar
  13. Pandey P (2013) Prevention of ARP spoofing: a probe packet based technique. In: 2013 IEEE 3rd international advance computing conference (IACC), IEEE, pp 147–153Google Scholar
  14. Plummer DC (1982) An ethernet address resolution protocol-converting network protocol to 48 bit ethernet address for transmission on ethernet hardware. RFC-826Google Scholar
  15. Prabadevi B, Jeyanthi N (2014) Distributed denial of service attacks and its effects on cloud environment-a survey. In: The 2014 international symposium on networks, computers and communications, IEEE, pp 1–5Google Scholar
  16. Prabadevi B, Jeyanthi N (2017a) Security solution for ARP cache poisoning attacks in large data centre networks. Cybern Inf Technol 17(4):69–86Google Scholar
  17. Prabadevi B, Jeyanthi N (2017) A mitigation system for ARP cache poisoning attacks. In: Proceedings of the second international conference on internet of things and cloud computing, ACM, p 20Google Scholar
  18. Prabadevi B, Jeyanthi N (2018) A framework to mitigate ARP sniffing attacks by cache poisoning. Int J Adv Intell Paradig 10(1–2):146–159CrossRefGoogle Scholar
  19. Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP Spoof problem. In: 6th international conference on electrical engineering/electronics, computer, telecommunications and information technology, 2009. ECTI-CON 2009, IEEE, vol 2, pp 910–913Google Scholar
  20. Quarterman JS (1987) RFC 1027—using ARP to implement transparent subnet gateways. Request for Comments, ‘Online, pp 1–7Google Scholar
  21. Rupal DR, Satasiya D, Kumar H, Agrawal A (2016) Detection and prevention of ARP poisoning in dynamic IP configuration. In: IEEE international conference on recent trends in electronics, information & communication technology (RTEICT), IEEE, pp 1240–1244Google Scholar
  22. Samvedi A, Owlak S, Chaurasia VK (2014) Improved secure address resolution protocol. arXiv preprint arXiv:1406.2930
  23. Saputro N, Akkaya K (2015) PARP-S: a secure piggybacking-based ARP for IEEE 802.11 s-based Smart Grid AMI networks. Comput Commun 58:16–28CrossRefGoogle Scholar
  24. Song MS, Lee JD, Jeong YS, Jeong HY, Park JH (2014) DS-ARP: a new detection scheme for ARP spoofing attacks based on routing trace for ubiquitous environments. Sci World J 2014:1–8. CrossRefGoogle Scholar
  25. Trabelsi Z (2016) The robustness of microsoft windows and apple mac OS X against ARP cache poisoning based network attacks. In: 2016 13th IEEE annual consumer communications & networking conference (CCNC), IEEE, pp 1074–1079Google Scholar
  26. Trabelsi Z, El-Hajj W (2010) On investigating ARP spoofing security solutions. Int J Internet Protoc Technol 5(1–2):92–100CrossRefGoogle Scholar

Copyright information

© The Society for Reliability Engineering, Quality and Operations Management (SREQOM), India and The Division of Operation and Maintenance, Lulea University of Technology, Sweden 2019

Authors and Affiliations

  1. 1.School of Information Technology and EngineeringVellore Institute of TechnologyVelloreIndia
  2. 2.Scientific Network for Innovation and Research ExcellenceMIR LabsAuburnUSA

Personalised recommendations