AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (1.7 MB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Bayes-Based ARP Attack Detection Algorithm for Cloud Centers

Huan MaHao DingYang YangZhenqiang Mi( )James Yifei YangZenggang Xiong
School of Computer and Communication Engineering, University of Science and Technology Beijing, Beijing 100083, China.
Department of Electronics and Communication Engineering, University of Illinois at Urbana-Champaign, Champaign, IL 61801, USA.
School of Computer and Information Science, Hubei Engineering University, Xiaogan 432000, China.
Show Author Information

Abstract

To address the issue of internal network security, Software-Defined Network (SDN) technology has been introduced to large-scale cloud centers because it not only improves network performance but also deals with network attacks. To prevent man-in-the-middle and denial of service attacks caused by an address resolution protocol bug in an SDN-based cloud center, this study proposed a Bayes-based algorithm to calculate the probability of a host being an attacker and further presented a detection model based on the algorithm. Experiments were conducted to validate this method.

References

[1]
Miao R., Yu M., and Jain N., NIMBUS: Cloud-scale attack detection and mitigation, in Proceedings of the 2014 ACM Conference on SIGCOMM, New York, USA, 2014, pp. 121–122.
[2]
Alarifi S. and Wolthusen D., Mitigation of cloud-internal denial of service attacks, in Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on, Oxford, UK, 2014, pp. 478–483.
[3]
Plummer D. C., Rfc 826: An ethernet address resolution protocol, InterNet Network Working Group, 1982.
[4]
Rathod S. B. and Reddy V. K., Secure live vm migration in cloud computing: A survey, International Journal of Computer Applications, vol. 103, no. 2, pp. 18–22, 2014.
[5]
Abad C. L. and Bonilla R., An analysis on the schemes for detecting and preventing arp cache poisoning attacks, in Distributed Computing Systems Workshops, 2007. ICDCSW07. 27th International Conference on, Toronto, Canada, 2007, p. 60.
[6]
Yeganeh S. H., Tootoonchian A., and Ganjali Y., On scalability of software-defined networking, Communications Magazine, IEEE, vol. 51, no. 2, pp. 136–141, 2013.
[7]
McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., Rexford J., Shenker S., and Turner J., Openflow: Enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
[8]
Dessouky M. M., Elkilany W,, and Alfishawy N., A hardware approach for detecting the ARP attack, in Informatics and Systems (INFOS), 2010 The 7th International Conference on, Cairo, Egypt, 2010, pp. 1–8.
[9]
Barbhuiya F., Biswas S., Hubballi N., and Nandi S., A host based des approach for detecting arp spoofing, in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, Paris, France, 2011, pp. 114–121.
[10]
Tripunitara M. V. and Dutta P., A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning, in Computer Security Applications Conference, 1999. (ACSAC99) Proceedings. 15th Annual, Phoenix, UK, 1999, pp. 303–309.
[11]
Lootah W., Enck W., and McDaniel P., ¡°Tarp: Ticket-based address resolution protocol,¡± Computer Networks, vol. 51, no. 15, pp. 4322–4337, 2007.
[12]
Bruschi D., Ornaghi A., and Rosti E., S-arp: A secure address resolution protocol, in Computer Security Applications Conference, 2003. Proceedings. 19th Annual, IEEE, 2003, pp. 66–74.
[13]
Kumar S. and Tapaswi S., A centralized detection and prevention technique against arp poisoning, in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, Kuala Lumpur, Malaysia, 2012, pp. 259–264.
[14]
Nam S. Y., Kim D., and Kim J., ¡°Enhanced arp: Preventing arp poisoning-based man-in-the-middle attacks,¡± Communications Letters, IEEE, vol. 14, no. 2, pp. 187–189, 2010.
[15]
Nam S. Y., Djuraev S., and Park M., Collaborative approach to mitigating arp poisoning-based man-in-themiddle attacks, Computer Networks, vol. 57, no. 18, pp. 3866–3884, 2013.
[16]
Gao J. and Xia K., Arp spoofing detection algorithm using icmp protocol, in Computer Communication and Informatics (ICCCI), 2013 International Conference on, Coimbatore, India, 2013, pp. 1–6.
[17]
Neminath H., Biswas S., Roopa S., Ratti R., Nandi S., Barbhuiya F., Sur A., and Ramachandran V., A des approach to intrusion detection system for arp spoofing attacks, in Control & Automation (MED), 2010 18th Mediterranean Conference on, Marrakech, Morocco, 2010, pp. 695–700.
[18]
Pandey P., Prevention of arp spoofing: A probe packet based technique, in Advance Computing Conference (IACC), 2013 IEEE 3rd International, Ghaziabad, India, 2013, pp. 147–153.
[19]
Hubballi N., Biswas S., Roopa S., Ratti R., and Nandi S., ¡°Lan attack detection using discrete event systems,¡± ISA Transactions, vol. 50, no. 1, pp. 119–130, 2011.
[20]
Ramachandran V. and Nandi S., Detecting arp spoofing: An active technique, in Information Systems Security, Jajodia S. and Mazumdar C., Eds. Springer, 2005, pp. 239–250.
Tsinghua Science and Technology
Pages 17-28
Cite this article:
Ma H, Ding H, Yang Y, et al. Bayes-Based ARP Attack Detection Algorithm for Cloud Centers. Tsinghua Science and Technology, 2016, 21(1): 17-28. https://doi.org/10.1109/TST.2016.7399280

499

Views

19

Downloads

17

Crossref

N/A

Web of Science

20

Scopus

1

CSCD

Altmetrics

Received: 20 August 2015
Accepted: 13 October 2015
Published: 04 February 2016
© The author(s) 2016
Return