ARP Spoofing in Action: An Ethical Approach to Network Security

Abstract

ARP spoofing is a serious problem for network security. It allows hackers to trick a network by linking their own MAC address to a real device’s IP address. This lets them steal, change, or block network traffic. Hackers can use this to launch attacks like Man in the Middle, session hijacking, and Denial of service. Old methods to detect ARP spoofing, like fixed IP-MAC lists and ICMP checks, do not work well in large or real-time systems. This paper suggests a smart way to find and stop ARP spoofing using Bettercap and Deep Packet Inspection (DPI). Bettercap watches ARP traffic in real time, while DPI carefully checks network packets for unusual activity. Together, these tools quickly and accurately detect ARP spoofing with little impact on network speed. The system keeps an eye on ARP messages, deeply examines packet details, and finds suspicious changes. When it detects an attack, it blocks harmful packets, fixes the ARP table with correct information, and informs network admins.

Country : India

1 Gowthami Kurabalakota2 Divya Pasham3 Kanishka G

  1. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India
  2. UG Student, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India
  3. Assistant Professor, Department of CSE-(Cyber Security), Madanapalle Institute of Technology & Science, Madanapalle 517325, A.P., India

IRJIET, Volume 9, Special Issue of INSPIRE’25 April 2025 pp. 245-249

doi.org/10.47001/IRJIET/2025.INSPIRE39

References

  1. T. S. Kotchakorn and T. Decjasawatwong, "Automatic attack detection and correction system development," in Proc. 13th Asia-Pacific Network Operations and Management Symposium (APNOMS), Taiwan, Sept. 21-23, 2011.
  2. V. Kumar, S. Chakraborty, F. A. Barbhuiya, and S. Nandi, "Detection of stealth Man-in-the-Middle attack in Wireless LAN," in Proc. 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012.
  3. T. Benson, D. L. Neal, and G. Manley, "Security in Software Defined Networks: Threats and Challenges," in Proc. 2017 IEEE International Conference on Computing, Networking and Communications (ICNC), 2017.
  4. P. S. Gupta and V. S. Ananya, "Real-time ARP Spoofing Detection in Network Security," in Proc. IEEE International Conference on Computer and Communication Engineering (ICCCE), 2018.
  5. R. K. Gupta and S. V. Raghavan, "Mitigation of ARP Spoofing Using Dynamic ARP Inspection in VLANs," Journal of Network Security, vol. 11, no. 2, pp. 35–44, 2016.
  6. M. L. Khamis and M. M. Ghoneim, "Detection and Prevention of ARP Spoofing in Network Using Software-Defined Networking," International Journal of Computer Science and Information Security (IJCSIS), vol. 14, no. 7, pp. 378–384, 2016.
  7. Y. Jiang, M. Zhang, and X. Li, "Anomaly Detection of ARP Spoofing in a Software-Defined Network," in Proc. IEEE International Conference on Smart Cloud (SmartCloud), 2018.
  8. C. T. Chou and S. W. Lee, "Detecting ARP Spoofing in Wireless Networks Using Statistical Analysis," in Proc. IEEE Global Communications Conference (GLOBECOM), 2015.
  9. R. V. Venkatesan and T. R. V. Chandran, "Implementation of ARP Spoofing Attack and Detection Methods," in Proc. International Conference on Emerging Trends in Computing, Communication and Nanotechnology (ICECCN), 2019.
  10. S. R. Reza, "Improved ARP Spoofing Detection and Prevention Mechanism Based on Dynamic Filtering," in Proc. 2017 IEEE International Conference on Communication Systems, Networks and Digital Technologies, 2017.
  11. C. L. Qiao, F. F. Liu, and L. F. Lu, "Network Security Based on Deep Packet Inspection and Threat Modeling," in Proc. 2019 IEEE International Conference on Computational Science and Engineering (CSE), 2019.
  12. J. D. Gibbons and M. A. Tushar, "Secure ARP: ARP Spoofing Detection and Prevention Using Public Key Infrastructure," International Journal of Computer Applications, vol. 120, no. 5, pp. 5–10, 2015.
  13. B. S. Chung and D. H. Son, "A Study of Deep Packet Inspection (DPI) for Network Security Applications," Journal of Communication and Computer, vol. 16, no. 1, pp. 50–56, 2019.