Abstract
AbstractMAC address spoofing has plagued LAN communication for a long time. Many attacks use it as a springboard to carry out subsequent attacks. The main reason for this kind of attack is the exposure of MAC address. If the source MAC address of the node can be hidden during frame forwarding, this kind of attack can be effectively prevented. This study proposes virtual MAC switching (VMS) as a solution to this problem. VMS uses multi-address hopping technology to make the MAC address of the frame change continuously in the forwarding process. Its unique address generation format makes other nodes unable to record or speculate the real MAC address of the node, so it cannot launch an attack. Experiments show that VMS is close to typical SDN switches in terms of delay, throughput, and overhead and has a higher security level.
Funder
National Social Science Foundation of China
Basic Public Welfare Research Program of Zhejiang Province
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference46 articles.
1. Stevens, W. R.: "TCP/IP Illustrated, Volume 2: The Implementation." Pearson Schweiz Ag (1995)
2. Kurose, J., Keith, R.: "Computer networks: A top down approach featuring the internet." (2010)
3. Plummer, D. C.: RFC826: Ethernet address resolution protocol. Computer & Communications Dictionary (1982)
4. Narten, T. et al.: Neighbor discovery for IP version 6 (IPv6). No. rfc4861. (2007)
5. Neminath, H., Biswas, S., Roopa, S., et al.: A DES Approach to intrusion detection system for arp spoofing attacks[C]. Control & automation. IEEE, 2010:695–700. (2010)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献