skip to main content
10.1145/2047456.2047468acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning

Published:30 September 2011Publication History

ABSTRACT

The field of academic security education today is dominated by defensive techniques. However, recently, offensive techniques which were originally developed by hackers, are gaining widespread approval. Many information security educators believe that teaching offensive methods yields better security professionals than teaching defensive techniques alone. In addition, every course in IT security should be accompanied by a basic discussion of legal implications and ethics.

In this paper, we describe a case study of the implementation of comprehensive hands-on lab exercises that are essential to security education. The lab exercises are about how to perform Denial of Service (DoS) and Man-in-the-Middle (MiM) attacks using ARP (Address Resolution Protocol) cache poisoning. The available defense techniques for detecting and preventing malicious ARP cache poisoning activities are also presented. The consequence of offering offensive lab exercises is that the overall students performance improved; but a major ethical concern has been identified. That is, the number of injected malicious ARP packets in the university network, from the students' laptops, increases considerably each time the students experiment the attacks in an isolated network laboratory environment.

References

  1. P. J. Denning. Great principles of computing. Communications of the ACM, 46(11):15--20, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Plummer, David C., "An Ethernet Address Resolution Protocol-Converting Network Protocol to 48 bit Ethernet Address for Transmission on Ethernet Hardware", RFC-826, November 1982.Google ScholarGoogle Scholar
  3. J. Harris. Maintaining ethical standards for computer security curriculum. In InfoSecCD '04: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, pages 46--48, New York, NY, USA, 2004, ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ARP Spoof Tool, http://www.imfirewall.com/en/arpspoof.htm.Google ScholarGoogle Scholar
  5. Cain & Abel, http://www.oxid.it/cain.html.Google ScholarGoogle Scholar
  6. SwitchSniffer, http://www.nextsecurity.net/software/SwitchSniffer.html.Google ScholarGoogle Scholar
  7. Winarp, http://www.arp-sk.org.Google ScholarGoogle Scholar
  8. WinArpSpoof, http://www.nextsecurity.net/software/Windows_ARP_Spoofer.html.Google ScholarGoogle Scholar
  9. WinArpAttacker, URL: http://www.xfocus.net/tools/200606/WinArpAttacker3.50.RarGoogle ScholarGoogle Scholar
  10. Zouheir Trabelsi, and Wassim El-Hajj, "On Investigating ARP Spoofing Security Solutions", International Journal of Internet Protocol Technology (IJIPT), Special Issue on "Recent Advances in Network Security Attacks and Defences", Int. J. of Internet Protocol Technology, Volume 5, Number 1--2, 2010, page: 92--100. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. LBNL's Network Research Group, "Arpwatch: Ethernet Monitor Program", http://www-nrg.ee.lbl.gov.Google ScholarGoogle Scholar
  12. Snort: http://www.snort.org/Google ScholarGoogle Scholar
  13. Bruschi, D. Ornaghi, A. Rosti, E., "S-ARP: a secure address resolution protocol", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Page(s): 66--74, 8--12 December 2003, Las Vegas, NV, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pandey Omkant, "O-ARP: a secure and fast Address Resolution Protocol", http://www.itbhu.ac.in/departments/comp/crypto/o-arp.pdf.Google ScholarGoogle Scholar
  15. Wesam Lootah, William Enck, and Patrick McDaniel, "TARP: Ticket-based Address Resolution Protocol", 21st Annual Computer Security Applications Conference (ACSAC 2005), December 5--9, 2005, Tucson, Arizona, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Goyal Vipul, Tripathy Rohit, Boyd Colin, and González Juan M., "An efficient solution to the ARP cache poisoning problem", Lecture Notes in Computer Science, Australasian conference on information security and privacy (ACISP), No10, vol. 3574, pp. 40--51, 4--6 July 2005, Brisbane, AUSTRALIA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Jerome Etienne, "ARPSec, an ARP security extension", 2000 Linux Symposium, July 19--22nd, Ottawa, Canada.Google ScholarGoogle Scholar
  18. Anatomy of an ARP poisoning attack. http://www.watchguard.com/infocenter/editorial/135324.asp.Google ScholarGoogle Scholar
  19. Cisco Systems. Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide, http://www.cisco.com. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Martin Mink and Felix C. Freiling, Is Attack Better Than Defense? Teaching Information Security the Right Way, Proceedings of the 3rd annual conference on Information security curriculum development, InfoSecCD'06, pp. 44--48, Kennesaw, Georgia, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. I. Arce and G. McGraw. Guest Editors' introduction: Why attacking systems is a good idea. IEEE Security & Privacy, 2(4): 17--19, July Aug. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. K. P. Arnett and M. B. Schmidt. Busting the ghost in the machine. Communications of the ACM, 48(8):92--95, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. M. Dornseif, F. C. Gartner, T. Holz, and M. Mink. An Offensive Approach to teaching Information Security: "Aachen Summer School Applied IT Security". Technical Report AIB-2005-02, RWTH Aachen, Jan. 2005.Google ScholarGoogle Scholar
  24. G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3--18. Kluwer, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Dongqing Yuan, and Jiling Zhong. A lab implementation of SYN flood attack and defense, SIGITE '08 Proceedings of the 9th ACM SIGITE conference on Information technology education, pp. 57--58, Cincinnati, Ohio, USA, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Sergio Caltagirone, Paul Ortman, Sean Melton, David Manz, Kyle King, and Paul Oman. Design and Implementation of a Multi-Use Attack-Defend Computer Security Lab, Proceedings of the 39th Annual Hawaii International Conference on System Sciences - HICSS, USA, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. "The state of infosec education in academia: Present and future directions," in National Colloquium on Information System Security Education, 1997, pp. 19--33.Google ScholarGoogle Scholar
  28. M. Bishop and D. Frincke, "Who watches the security educators?" IEEE Security and Privacy, vol. 1, no. 3, pp. 56--58, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. J. M. Hill, C. A. Carver Jr., J. W. Humphries, and U. W. Pooch, "Using an isolated network laboratory to teach advanced networks and security," in 32nd SIGCSE Technical Symposium on Computer Science Education. Charlotte, North Carolina, United States: ACM Press, 2001, pp. 36--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Mullins, J. Wolfe, M. Fry, E. Wynters, W. Calhoun, R. Montante, and W. Oblitey, "Panel on integrating security concepts into existing computer courses," SIGCSE Bulletin, vol. 34, no. 1, pp. 365--366, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      InfoSecCD '11: Proceedings of the 2011 Information Security Curriculum Development Conference
      September 2011
      111 pages
      ISBN:9781450308120
      DOI:10.1145/2047456

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 30 September 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate18of23submissions,78%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader