The Role of Client Isolation in ProtectingWi-Fi Users from ARP Spoofing Attacks

Timur Mirzoev*, Joel Stacey White**
* Professor of Information Technology Department, Georgia, Southern University, United States.
** Office of Information & Instructional Technology at Bainbridge College.
Periodicity:March - May'2012
DOI : https://doi.org/10.26634/jit.1.2.1779

Abstract

This study investigates the role of the client isolation technology Public Secure Packet Forwarding (PSPF) in defending 802.11 wireless (Wi-Fi) clients, connected to a public wireless access point, from Address Resolution Protocol (ARP) cache poisoning attacks, or ARP spoofing. Exploitation of wireless attack vectors such as these have been on the rise and some have made national and international news. Although client isolation technologies are common place in most wireless access points, they are rarely enabled by default. Since an average user generally has a limited understanding of IP networking concepts, it is rarely enabled during access point configurations. Isolating wireless clients from one another on unencrypted wireless networks is a simple and potentially effective way of protection. The purpose of this research is to determine if a commonly available and easily implementable wireless client isolation security technology, such as PSPF, is an effective method for defending wireless clients against attacks.

Keywords

wireless networking, Wi-Fi, information security, ARP poisoning, PSPF

How to Cite this Article?

Mirzoev, T., and White, S. J. (2012). The Role Of Client Isolation In Protecting Wi-Fi Users From ARP Spoofing Attacks. i-manager’s Journal on Information Technology, 1(2), 11-17. https://doi.org/10.26634/jit.1.2.1779

References

[1]. Ali, F. (2008). IP Spoofing. The Internet Protocol Journal, Volume 10, No. 4. Retrieved January 30, 2011, from http://www.cisco.com/web/about/ac123/ac147/archived _issues/ipj_10-4/104_ip-spoofing.html.
[2]. Bowman, B. (2003). WPA Wireless Security for Home Networks. Retrieved February 5, 2011, from http://60.250.34.222/windowsxp/using/networking/expert/ bowman_03july28.mspx.
[3]. Brodkin, J. (2011). Windows drops below 90% market share. Network World, January13, 2011. Retrieved January 29, 2011, from http://www.networkworld.com/community/ blog/windows-drops-below-90-market-share.
[4]. Butler, E. (2010). Firesheep. Codebutler. Retrieved January 28, 2011, from http://codebutler.com/firesheep.
[5]. Cayirci, E., & Rong, C. (2009). Security in Wireless Ad Hoc and Sensor Network. The Atrium, Southern Gate, Chichester, West Sussex, United Kingdom: John Wiley & Sons Ltd.
[6]. Ciampa, M. (2006). CWNA Guide to Wireless LANs, Second Edition. 25 Thompson Place, Boston, MA: Thompson Course Technology.
[7]. Cisco. (2010). Chapter 6 – Configuring Radio Setting. Enabling and Disabling Public Secure Packet Forwarding. Cisco IOS Software Configuration Guide for Cisco Aironet Access Points Cisco IOS Releases 12.4(10b)JA and 12.3(8)JEC. Retrieved Januar y 30, 2011 from http://www.cisco.com/en/US/docs/wireless/access_point/1 2.4_10b_JA/configuration/guide/scg12410b-chap6- radio.html#wp1038494.
[8]. Cisco. (2011). Cisco Unified Wireless Network Solutions Guide: The Benefits of Cisco Unified Wireless Network Mobility Services for Educational Institutions. Cisco Aironet 1500 Series. Retrieved Januar y 30, 2011, from http://www.cisco.com/en/US/prod/collateral/wireless/ps56 79/ps6548/prod_brochure0900aecd80565d2d.html#wp 9000004.
[9]. Cross, M. (2008). Scene of the Cybercrime, Second Edition. 30 Corporate Drive, Burlington, MA: Syngress Publishing, Inc.
[10]. Di Pasquale, A. (2011). ArpOn – Arp handler inspectiON. ARPON. Retrieved January 30, 2011, from http://arpon.sourceforge.net/.
[11]. Gahran, A. (2010). Using Wi-Fi? Firesheep may endanger your security. CNNTech, November 01, 2010. Retrieved January 28, 2011, from http://articles.cnn.com/ 2010-11-01/tech/firesheep.wifi.security_1_firesheepfirefox- wi-fi-social-networking-sites-firefox-extensionsecurity?_ s=PM:TECH.
[12]. Graves, K. (2007). CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50. 10475 Crosspoint Blvd., Indianapolis, IN: Wiley Publishing.
[13]. Kendrick, J. (2010). Smartphone Wi-Fi Usage on the Rise. GIGAOM, August 24, 2010. Retrieved February 29, 2011, from http://gigaom.com/mobile/smartphone-wi-fiusage- on-the-rise/.
[14]. Leonhard, W. (2010). 'Sidejacking' browser add-on stumps security experts. InfoWorld, November 10, 2011. Retrieved March 20, 2011, from http://www.infoworld.com/ t/endpoint-security/sidejacking-browser-add-stumpssecurity- experts-790.
[15]. Marcus, D. (2010). I'll take the Firesheep with a side order of ARP Poisoning please. McAfee Labs Blog Central, October 25, 2010. Retrieved January 28, 2011, from http://blogs.mcafee.com/mcafee-labs/ill-take-thefiresheep- with-a-side-order-of-arp-poisoning-please.
[16]. Miller, D., & Gregg, M. (2011). Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills, 3rd Edition. 10475 Crosspoint Blvd., Indianapolis, IN: Wiley Publishing.
[17]. Orebaugh, A. (2007). Wireshark and Ethereal Network Protocol Analyzer Toolkit. 800 Hingham Street, Rockland, MA: Syngress Publishing, Inc.
[18]. Oxid. (2011). Cain & Abel.OXID.it. Retrieved February 2, 2011, from http://www.oxid.it/cain.html
[19]. Putman, B. (2005). 802.11 WLAN Hands-On Analysis: Unleashing the Network Monitor for Troubleshooting and Optimization. 1663 Liberty Drive, Bloomington, IN: Authorhouse.
[20]. Rittinghouse, J. W., & Ransome, J. F. (2004). Wireless Operational Security. 200 Wheeler Road, Burlingtton, MA: Digital Press.
[21]. Sanders, C. (2010). Understanding Man-In-The-Middle Attacks - Part 4: SSL Hijacking. WindowSecurity.com, June 09, 2010. Retrieved May 3, 2011, from http://www.windowsecurity.com/articles/Understanding- Man-in-the-Middle-Attacks-ARP-Part4.html.
[22]. Umar, A. (1993). Distributed Computing and Client- Server Systems. Englewood Cliffs, NJ: PrenticeHall PTR, Prentice-Hall, Inc.
[23]. Vaughan-Nichols, S. (2010). Herding Firesheep. ZDNet: Networking, November 1, 2010. Retrieved January 28, 2011, from http://www.zdnet.com/blog/networking/ herding-firesheep/293.
[24]. Wallingford, T. (2006). VoIP Hacks. 1005 Gravenstein Highway North, Sebastopol, CA: O'Reilly Media.
[25]. WeFi. (2011). About WeFi. WeFi. Retrieved January 30, 2011, from http://www.wefi.com/about/.
[26]. Wireshark. (2011). Wireshark – Go Deep. Wireshark Foundation. Retrieved Februar y 2, 2011, from http://www.wireshark.org/about.html.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.