|
ArpON (ARP handler inspection) is a computer software project to improve network security. It has attracted interest among network managers〔(【引用サイトリンク】 url=http://www.kaspersky.com/images/Jaqueline%20Carmilema%20Zamora.pdf )〕 and academic researchers〔(【引用サイトリンク】 url=https://d1b10bmlvqabco.cloudfront.net/attach/h6zow7ayz7149z/h869t5jy5121fz/h869tfdkomv1lj/An_Introduction_to_Computer_Networks_week_4.pdf )〕〔(【引用サイトリンク】 first1=Stefan )〕 and is frequently cited as a significant means of protecting against ARP-based attacks.〔(【引用サイトリンク】 first1=Patrik )〕〔(【引用サイトリンク】 first1=J. S. White )〕 ==Motivation== The Address Resolution Protocol (ARP) has security issues. These include the Man In The Middle (MITM) attack through ARP Spoofing, ARP Cache Poisoning or ARP Poison Routing (APR) attacks. ArpON also blocks derived attacks including Sniffing, Hijacking, Injection, Filtering attacks and complex derived attacks, as: DNS Spoofing, WEB Spoofing, Session Hijacking and SSL/TLS Hijacking attacks. This is possible using three kinds of anti ARP Spoofing techniques. ArpON requires a daemon in every host to be authenticated. It does not modify the classic ARP standard base protocol defined by IETF, but rather sets precise policies for static networks, dynamic networks and hybrid networks. ArpON does not use a centralized server or encryption. It uses a cooperative authentication between the hosts based on the policies that all hosts with ArpON must respect. These policies allow exactly total protection by these attacks for all hosts that use ArpON. 抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)』 ■ウィキペディアで「ArpON」の詳細全文を読む スポンサード リンク
|