Detecting ARP Spoofing: An Active Technique: Abstract. The Address Resolution Protocol (ARP) Due To Its Stateless
Detecting ARP Spoofing: An Active Technique: Abstract. The Address Resolution Protocol (ARP) Due To Its Stateless
Detecting ARP Spoofing: An Active Technique: Abstract. The Address Resolution Protocol (ARP) Due To Its Stateless
1 Introduction
The ARP protocol is one of the most basic but essential protocols for LAN com-
munication. The ARP protocol is used to resolve the MAC address of a host given
its IP address. This is done by sending an ARP request packet (broadcasted) on
the network. The concerned host now replies back with its MAC address in an
ARP reply packet (unicast). In some situations a host might broadcast its own
MAC address in a special Gratuitous ARP packet. All hosts maintain an ARP
cache where all address mappings learnt from the network (dynamic entries) or
configured by the administrator (static entries) are kept. The dynamic entries
age out after a fixed interval of time, which varies across operating systems.
After the entry ages out it is deleted from the cache and if the host wants to
communicate with the same peer, another ARP request is made. The static en-
tries never age out. A more detailed discussion of the ARP protocol is available
at [1].
The ARP protocol is stateless. Hosts will cache all ARP replies sent to them
even if they had not sent an explicit ARP request for it. Even if a previous un-
expired dynamic ARP entry is there in the ARP cache it will be overwritten by
a newer ARP reply packet on most operating systems. All hosts blindly cache
the ARP replies they receive, as they have no mechanism to authenticate their
peer. This is the root problem, which leads to ARP spoofing.
S. Jajodia and C. Mazumdar (Eds.): ICISS 2005, LNCS 3803, pp. 239–250, 2005.
c Springer-Verlag Berlin Heidelberg 2005
240 V. Ramachandran and S. Nandi