Netinfo Security ›› 2024, Vol. 24 ›› Issue (10): 1604-1610.doi: 10.3969/j.issn.1671-1122.2024.10.015

Previous Articles     Next Articles

Research on ARP Spoofing Attack and Hardware Defense

HE Kaiyu1, WANG Bin2, YU Zhe2(), CHEN Fang2   

  1. 1. Henan Institute of Metrology and Testing Science, Zhengzhou 450008, China
    2. National Supercomputing Center in Zhengzhou, Zhengzhou University, Zhengzhou 450001, China
  • Received:2024-06-05 Online:2024-10-10 Published:2024-09-27

Abstract:

In view of the cumbersome configuration and high cost of the existing ARP spoofing attack defense methods, a hardware defense device based on FPGA was designed and tested in the real network environment. First, the real LAN environment was built, and the arpspoof tool was used to implement ARP spoofing attack on the target host in the LAN, and the target host couldn’t access the external network after being attacked. A network security protection device based on FPGA platform was designed to identify and filter ARP spoofing packets by analyzing the network packets in the upstream and downstream links and comparing them with the corresponding packet fields of the security protection policy. Finally, the network security protection device was connected to the LAN, and the ILA of VIVADO captured the related field waveforms of ARP spoofing attack packets. The waveform data shows that the network security device can effectively identify the MAC address and IP address of ARP spoofing attack packets and effectively intercept them. The changes of network link bandwidth, attack interception rate, and system resource usage of the attacked host are also collected.

Key words: network security, ARP, spoofing attack, FPGA, hardware defense

CLC Number: