Jump to content

ARP cache: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Harm of ARP
mNo edit summary
Line 1: Line 1:
{{refimprove|date=July 2017}}
{{refimprove|date=July 2017}}
The '''ARP(address resolution protocol'''<ref>{{Cite journal|last=Moon|first=Daesung|last2=Lee|first2=Jae Dong|last3=Jeong|first3=Young-Sik|last4=Park|first4=Jong Hyuk|date=2016-05-01|title=RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks|url=https://link.springer.com/article/10.1007/s11227-014-1353-0|journal=The Journal of Supercomputing|language=en|volume=72|issue=5|pages=1740–1756|doi=10.1007/s11227-014-1353-0|issn=0920-8542}}</ref>''') Cache''' is a collection of '''ARP''' entries (mostly dynamic) that are created when a hostname is resolved to an IP address and then an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address)<ref>{{Cite web|url=http://www.techrepublic.com/blog/windows-and-office/quick-tips-flush-the-arp-cache-in-windows-7/|title=Quick Tips: Flush the ARP cache in Windows 7 - TechRepublic|website=TechRepublic|language=en|access-date=2017-07-14}}</ref>. ARP cache has the disadvantage of being used by hackers and cyber attackers. ARP cache helps the attackers hide behind a fake IP address and do the harm without being caught<ref>{{Cite journal|last=Moon|first=Daesung|last2=Lee|first2=Jae Dong|last3=Jeong|first3=Young-Sik|last4=Park|first4=Jong Hyuk|date=2016-05-01|title=RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks|url=https://link.springer.com/article/10.1007/s11227-014-1353-0|journal=The Journal of Supercomputing|language=en|volume=72|issue=5|pages=1740–1756|doi=10.1007/s11227-014-1353-0|issn=0920-8542}}</ref>.
The '''ARP(address resolution protocol'''<ref>{{Cite journal|last=Moon|first=Daesung|last2=Lee|first2=Jae Dong|last3=Jeong|first3=Young-Sik|last4=Park|first4=Jong Hyuk|date=2016-05-01|title=RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks|url=https://link.springer.com/article/10.1007/s11227-014-1353-0|journal=The Journal of Supercomputing|language=en|volume=72|issue=5|pages=1740–1756|doi=10.1007/s11227-014-1353-0|issn=0920-8542}}</ref>''') Cache''' is a collection of '''ARP''' entries (mostly dynamic) that are created when a hostname is resolved to an IP address and then an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address)<ref>{{Cite web|url=http://www.techrepublic.com/blog/windows-and-office/quick-tips-flush-the-arp-cache-in-windows-7/|title=Quick Tips: Flush the ARP cache in Windows 7 - TechRepublic|website=TechRepublic|language=en|access-date=2017-07-14}}</ref>. ARP cache has the disadvantage of being used by hackers and cyber attackers. ARP cache helps the attackers hide behind a fake IP address and do the harm without being caught<ref>{{Cite journal|last=Moon|first=Daesung|last2=Lee|first2=Jae Dong|last3=Jeong|first3=Young-Sik|last4=Park|first4=Jong Hyuk|date=2016-05-01|title=RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks|url=https://link.springer.com/article/10.1007/s11227-014-1353-0|journal=The Journal of Supercomputing|language=en|volume=72|issue=5|pages=1740–1756|doi=10.1007/s11227-014-1353-0|issn=0920-8542}}</ref>.


==References==
==References==

Revision as of 18:46, 14 July 2017

The ARP(address resolution protocol[1]) Cache is a collection of ARP entries (mostly dynamic) that are created when a hostname is resolved to an IP address and then an IP address is resolved to a MAC address (so the computer can effectively communicate with the IP address)[2]. ARP cache has the disadvantage of being used by hackers and cyber attackers. ARP cache helps the attackers hide behind a fake IP address and do the harm without being caught[3].Beyond the fact that ARP cache helps the attackers but it also prevents the attacks by "distinguish between low level IP and IP based vulnerabilities"

References

  1. ^ Moon, Daesung; Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk (2016-05-01). "RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks". The Journal of Supercomputing. 72 (5): 1740–1756. doi:10.1007/s11227-014-1353-0. ISSN 0920-8542.
  2. ^ "Quick Tips: Flush the ARP cache in Windows 7 - TechRepublic". TechRepublic. Retrieved 2017-07-14.
  3. ^ Moon, Daesung; Lee, Jae Dong; Jeong, Young-Sik; Park, Jong Hyuk (2016-05-01). "RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks". The Journal of Supercomputing. 72 (5): 1740–1756. doi:10.1007/s11227-014-1353-0. ISSN 0920-8542.