Hybrid Encryption Technique to Prevent Spoofing Attacks in Address Resolution Protocol

  • C. Divya, Dr. D. Francis Xavier Christopher


Address Resolution Protocol (ARP) acts as the communication protocol by mapping the IP addresses of the host to its hardware MAC address. Hacking or compromising ARP protocol is a serious security threat which is mostly achieved through spoofing attacks. Many techniques have been developed in prior studies to prevent such spoofing attacks. Although highly effective in tackling these attacks, there is possibility of attackers deigning advanced strategies to execute the spoofing attack. To overcome this problem, efficient encryption algorithm must be used such that it increases the data security and also renews the trustworthy information of ARP table. These properties improve the ARP detection module and also avoid the leakage of trustworthy information. Considering these benefits, a novel hybrid encryption algorithm is presented in this paper by combining the Two-fish (TF) and Advanced Encryption Standard (AES) schemes. This hybrid TF-AES algorithm improves the security by encryption with less complexity and reduces the threat of spoofing. When utilized with an efficient ARP spoofing prevention model, it enhances the overall system performance and ensures highest quality-of-service to all associated parties. The major significance of this proposed hybrid algorithm is that it effectively reduces the resource utilization and hence the traffic complexity is also reduced. This can be evident through the minimum encryption time and higher throughput achieved by the TF-AES. Experiments are conducted to evaluate the performance of the proposed TF-AES in the ARP prevention model which showed that this approach improved detection of ARP spoofing attacks with 90% accuracy and also increased the data security.

How to Cite
Dr. D. Francis Xavier Christopher, C. D. (2020). Hybrid Encryption Technique to Prevent Spoofing Attacks in Address Resolution Protocol. International Journal of Advanced Science and Technology, 29(3), 3551 - 3564. Retrieved from https://sersc.org/journals/index.php/IJAST/article/view/4838