Preventing ARP Attacks using a Fuzzy-Based Stateful ARP Cache Zouheir Trabelsi College of Information Technology UAE University United Arab Emirates Email: trabelsi@uaeu.ac.ae Wassim El-Hajj College of Information Technology UAE University United Arab Emirates Email: welhajj@uaeu.ac.ae Abstract— ARP cache poisoning is considered to be one of the easiest and dangerous attacks in local area networks. This paper proposes a solution to the ARP poisoning problem by extending the current ARP protocol implementation. Instead of the traditional stateless ARP cache, we use a stateful ARP cache in order to manage and secure the ARP cache. We also use a novel Fuzzy Logic approach to differentiate between normal and malicious ARP replies. The Fuzzy Logic controller uses a dynamically populated data base that adapts to network changes. The limits of the current approaches are discussed and analyzed. Keywords: ARP cache poisoning, Man-in-the-Middle (MiM) attack, Denial of Service (DoS) attack, Cloning attack, stateful ARP cache, Fuzzy Logic. I. I NTRODUCTION Local Area Networks (LAN) use ARP, the Address Resolution Protocol, to resolve IP addresses into hardware, or MAC (Medium Access Controllers), addresses [1]. The LAN’s hosts keep caches of resolved addresses, called the ARP caches. ARP resolution is invoked when a new IP address has to be resolved or an entry in the ARP cache expires. ARP has proved to work well under regular circumstances, but it was not designed to cope with malicious hosts performing ARP cache poisoning or spoofing attacks. The ARP poisoning attacks are often used as part of other serious attacks: Man-in-the-Middle (MiM) attack, and Denial of Service (DoS) attack. With a MiM attack, traffic between two hosts is redirected to a third host, which is usually the attacker’s host. This attack allows the attacker to sniff the traffic exchanged between the two victim hosts. With DoS attack, a target host is denied from communicating with other hosts. This paper proposes a solution to the ARP poisoning problem by extending the existing ARP protocol. The new extension includes (1) statefull ARP cache, (2) Fuzzy Logic controller, (3) cross layer design, and (4) adaptive database manipulation. The limits of current approaches are discussed. The rest of the paper is organized as following: Section II provides some background about ARP attacks. Section III provides an overview of the related work done in this area. Section IV discusses the proposed approaches. Section V concludes the paper and presents future research directions. II. BACKGROUND: ARP CACHE POISONING AND ARP SPOOFING When a host adds an incorrect <IP, MAC> mapping to its ARP cache, this is known as ARP cache poisoning or ARP spoofing. The last terminology refers to the fact that an attacker uses fake or ”spoofed” ARP packets to poison an ARP cache. In an ARP cache poisoning attack, the attacker sends ARP replies or requests with fake <IP, MAC> mappings, in an attempt to poison the ARP caches of other hosts on the LAN. Based on our experience’s results in [2], skilled attackers use mostly ARP requests to poison their target ARP caches, since ARP requests can always corrupt any ARP cache even if the sender’s IP address is not in the target ARP cache. The ARP poisoning attacks are often used as part of other serious attacks: DoS attacks: An attacker can poison an ARP cache of a host with a fake <IP, MAC> pairing so that every packet that host sends is sent to a fake host, or to the attacker’s host instead of its real destination. In the latter case, the attacker blocks the communication from the host being attacked. Host impersonation: Instead of just dropping the packets received from the host being attacked, the attacker can respond, impersonating any host in the network. MiM attacks: By spoofing two hosts in the network at the same time, an attacker can silently sit in between the hosts so that they think they are communicating with each other. Then, the attacker is able to listen to the traffic sent in both directions. With a MiM attack, the attacker can gain access to sensitive information (e.g. passwords, emails’ contents) or he/she can even modify the data being sent, compromising the data’s integrity. Cloning attack (MAC spoofing attack): In this attack, the malicious host changes its IP and MAC to become identical to those of the victim host. Once this change is done, there will be two hosts in the network with the same IP and MAC addresses. For the victim host, this situation will cause some network disconnection troubles 1-4244-0353-7/07/$25.00 ©2007 IEEE This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 2007 proceedings. 1355