ARP cache poisoning

(redirected from ARP spoofing)
Also found in: Wikipedia.

ARP cache poisoning

A method of intercepting packets in a TCP/IP network by sending a false address resolution protocol (ARP) message into the network. In order to accomplish this, the attacker must have access to the local network. The false ARP message generally redirects traffic to the perpetrator's computer, which is used to view or modify the network packets in some manner. See ARP, ARP cache and man-in-the-middle attack.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
Typical examples for these attacks are ARP scan, ARP spoofing [11], port stealing, DHCPv4 starvation [12], and DHCPv4 spoofing.
ARP spoofing is prevented in this context by discarding nonapproved source addresses.
-Dynamic ARP Inspection (DAI) inspects ARP packets, can prevent from ARP spoofing and ARP cache poisoning attacks, validate ARP packets, and discard invalid IP-to-MAC address bindings according to DHCP snooping or static DHCP binding, keep the MAC table correct.
In [6], the authors propose a way to detect anomalous events by analyzing the users' operation history of DLNA devices using ARP spoofing. A collaborative content play method is proposed in [7] that automatically associates the main-content with the sub-content based on attribute information matching in order to enhance user entertainment experience.
ARP spoofing is a technique where fake ("spoofed") ARP messages are sent onto a Local Area Network.
An ARP spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another.
Section 2 discusses related studies including problems in ARP spoofing, security requirements, and existing research.
For advanced device-detection and policy-enforcement capabilities, the appliance protects against ARP spoofing, and enables session-specific policy creation and enforcement, open-port hardening and network-agnostic blocking.--ForeScout Technologies
He gives a summary of Unix and Windows host security, including basic tools and techniques, then covers privacy and anonymity that will use encryption and other methods to guard against such felonies as phishing, firewalls, including installing and using commercial firewall products, encryption and securing services, network security, including detecting ARP spoofing and tracking attackers, wireless security, logging, monitoring and trending, secure tunnels, network intrusion protection, recovery and response.
Like many IP devices, VoIP phones are vulnerable to ARP spoofing, allowing man-in-the-middle attacks and including data interception and packet injection.
With the Layer 2 Firewall, wireless clients are protected from popular security breaches such as ARP spoofing, password sniffing, DHCP spoofing, and other malicious attacks commonly found in public wireless environments.