Application of ARP attacks and defense in network security

Source: Internet
Author: User

IT technology is in the ascendant, but behind its development is computer technology.Network SecurityThinking about the problem, this security risk is always wrong with the Internet technology has an impact. Network security has become the most popular topic. Network security protection has also become one of the popular network technologies, protecting the normal and orderly development of the Internet.

With the wide application of Wireless communication technology, traditional Local Area networks have become increasingly unable to meet people's needs. As a result, Wireless Local Area Network (WLAN) has emerged and is developing rapidly. From a professional perspective, a wireless LAN uses wireless channels to implement communication between network devices and to achieve mobile, personalized, and broadband communication. Broad application prospects, broad market demands, and technical realization promote the improvement and industrialization of Wireless LAN technology. The commercial 802.11n network has gradually begun to prove this. In the academic, medical, manufacturing, and warehousing industries, wireless networks are playing an increasingly important role. Wireless Networks will inevitably enter the golden age of development. At the same time, professionals in this area have also become the "Shannon" in the industry, and all major enterprises are competing for competition.

ToARPFor example, "ARP" is the full name of Address Resolution Protocol. The Chinese name is the Address Resolution Protocol. It works at the data link layer and communicates with the hardware interface at this layer, at the same time, it provides services to the upper layer .) Most people are familiar with this security direction problem. IP packets are usually sent over Ethernet, and Ethernet devices do not recognize 32-bit IP addresses. They transmit Ethernet packets at 48-bit Ethernet addresses. Therefore, the IP destination address must be mapped to the Ethernet destination address. In Ethernet, to directly communicate with another host, you must know the MAC address of the target host. But how can I obtain the target MAC address? It is obtained through the Address Resolution Protocol. ARP is used to resolve the IP address in the network to the MAC address of the hardware address) to ensure smooth communication.

ARPIt can be used to detect duplicate IP addresses. This is done by sending an ARP request called free ARP. Free ARP is an ARP request sent to your IP address. In free ARP, the SPA sender Protocol address) and TPA target Protocol address) are set to the same IP address.

If a node sends an ARP request to its IP address, it should not receive any ARP response frame, so that the node can determine that no other node uses the same IP address as it. If a node sends an ARP request to its IP address, the node returns an ARP response, so that another node can use the same IP address. If no ARP response is received after three free ARP packets are sent, the IP address is assumed to be unique in this network segment.

After learning through the system, the learner can master 1. basic knowledge of microwave communication and RF, knowledge of WLAN Physical Layer 2. through experiments, theory, and practice, we will learn how to prepare an independent/lightweight AP, and how to use WLC to manage AP3. basic wireless security knowledge, including WEP, WPA, and wpa2. debugging and connection of wireless application software 5. maintain and configure the management of the WCS server and learn about the content of the wireless site survey. 6. Learn the Design and Implementation of Small wireless networks through comprehensive tests and real project explanations.

 
  1. Lan Network Security Solution
  2. Handling of ARP attacks on wireless routers
  3. Analysis and Summary of potential wireless network security risks
  4. Enhance wireless network security by combining VPN and Wireless AP

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.