The mapping of Layer 3 (IP) to Layer 2 (MAC) addresses is a key service in IP networks, and is achieved via the Address Resolution Protocol (ARP) protocol in IPv4. Due to its stateless nature and lake of authentication, ARP is an easy goal to spoofin
g attacks, which can enable Denial of Service (DoS) or Man-in-the-Middle (MIM) attacks. In this search, we discuss the problem of ARP spoofing in the context of Software Defined Networks (SDNs). We studied important parameters such as throughput, delay and the availability of the network. Results showed that ARP spoofing attacks was able to make a negative effects on network performance
In this search, we provide a study
about the security in VANET networks which are considered to be a
part of mobile wireless networks and designed to work between
moving vehicles. The most important security flaws of this
networks and its applica
tions are studied.
In fact, we study the most important and dangerous attacks that may
target VANET networks and analyze its main risks. Furthermore,
we simulate some of these attacks Specifically Denial-of Service
(DOS) attack using prober tools depending on chosen parameters
that characterize the network performance. moreover, we provide
some Security solutions to help counter measuring these attacks and
minimize this effects, and Finally we apply these solutions and
evaluate them.
Distributed Denial of Service attack (DDOS) on Vehicular Ad Hoc Networks
(VANETs) is considered to be one of the most serious types of attacks that can be targeted
to those networks. The danger of this attack is in the difficulty of detection becau
se of the
cooperation of several attacking nodes in the network, and its impact on the availability
requirement that is one of the most important security requirements in a network offering
real-time applications .In our research, we study the effect of this attack on VANET
network in the city, taking into consideration two cases. In the first case the target of the
attack is the nodes, while in the second one, the target is the road side units (RSU).
Simulation results have shown that this attack has a significant impact on both cases, by
comparing the basic parameters of the network, such as throughput in/out and the number
of dropped packets, before and after the attack.