RE: computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security by henrychidiebere

View this thread on steempeak.com

Viewing a response to: @wisdomdavid/computer-networking-and-inter-connectivity-tutorial-2-network-types-technologies-and-network-security

· @henrychidiebere ·
I'm so happy seeing guys venture into my domain. I love your work and I would love to ask a question. How do one mitigate IP spoofing attacks based on address resolution protocol impersonation?
properties (22)
post_id52,076,801
authorhenrychidiebere
permlinkre-wisdomdavid-201867t152559633z
categorysteemstem
json_metadata"{"community": "esteem", "app": "esteem/1.6.0", "tags": ["steemstem", "stemng", "education", "adsactly", "technology"], "format": "markdown+html"}"
created2018-06-07 14:26:03
last_update2018-06-07 14:26:03
depth1
children6
net_rshares0
last_payout2018-06-14 14:26:03
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length193
author_reputation9,143,471,406,700
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries
0.
accountesteemapp
weight1,000
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@eurogee ·
We are here to learn and nothing stop us from becoming highly knowledgeable in any particular niche. Had learnt so many things that would not have been possible without steemit.

This your question shows your versed, and I do hope the author @wisdomdavid provides a good answer to this question.

*Oh😱! I see he has "wisdom" to his name. He must be a genius😂*

This article worth consulting by those researching on similar topic.

Regards

@eurogee of @euronation and @steemstem communities
properties (22)
post_id52,082,128
authoreurogee
permlinkre-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t150738780z
categorysteemstem
json_metadata"{"tags": ["steemstem"], "users": ["wisdomdavid", "eurogee", "euronation", "steemstem"], "app": "steemit/0.1"}"
created2018-06-07 15:07:33
last_update2018-06-07 15:07:33
depth2
children1
net_rshares0
last_payout2018-06-14 15:07:33
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length490
author_reputation35,390,678,500,126
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@wisdomdavid ·
thanks so much for stopping by @eurogee. I do appreciate your presence😄
properties (22)
post_id52,096,682
authorwisdomdavid
permlinkre-eurogee-re-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t172038157z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"], "users": ["eurogee"]}"
created2018-06-07 17:20:39
last_update2018-06-07 17:20:39
depth3
children0
net_rshares0
last_payout2018-06-14 17:20:39
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length71
author_reputation1,190,023,548,895
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
@wisdomdavid ·
First, there are different techniques used to identify spoofing via arp. Softwares can be implemented  but I will just give a quick info not going too deep. You know that arp works mainly on LAN to request and recognize the mac address and ip address of different host in the same network when sent with respect to the ip address. When an arp request is being sent, the distinct host replies with both the ip address and the MAC address in unicast(one to one) depends though. And all these contains packets that is packaged in a frame that is transmitted in the network. Thus, one solution is implementing Reverse path forwarding. In the place where I work, we make use of Fortigate firewall which perform this aspect of RPF. Fortigate is owned by Fortinet which tries as much to enhance network security on different enterprise. We make use of forti analyzer, forticlient in compliance with fortigate(on an end user computer). Our firewall blocks ip packets from reaching a destination if it does not belong to the routing domain and if its subnet is corresponding our network. Also, since arp is mainly used by switches, security measures can be taken in the area of the switch but that depends on the process you want to use. One is port security on the switch.
👍  
properties (23)
post_id52,096,320
authorwisdomdavid
permlinkre-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t171714571z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 17:17:15
last_update2018-06-07 17:17:15
depth2
children3
net_rshares5,070,111,547
last_payout2018-06-14 17:17:15
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length1,264
author_reputation1,190,023,548,895
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@henrychidiebere ·
A very nice response but I have a little correction to make, address resolution protocol is used by a host within a LAN to identify the MAC address. Hence, it already knows the IP address, so only the MAC address is returned after a successful ARP. Also you answered my question from a layer 7 perspective but I was expecting you to answer the question from a layer 3 to layer 1 perspective, though your answer is purely valid and helpful. Thanks buddy.
👍  
properties (23)
post_id52,098,461
authorhenrychidiebere
permlinkre-wisdomdavid-re-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t173830353z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 17:38:18
last_update2018-06-07 17:38:18
depth3
children2
net_rshares1,305,951,808
last_payout2018-06-14 17:38:18
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length453
author_reputation9,143,471,406,700
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000
author_curate_reward""
vote details (1)
@wisdomdavid · (edited)
Thanks buddy..in my response I quoted "in respect to the ip address".  and to correct you too, In the format of arp, when replying, the ip address and the MAC is sent back to the host together.  if you need the layer 1 to 3, then you can consider..port security, dynamic arp inspection and T-Arp as well. in additiion, fortigate does not only work in layer 7, because its configuration is done exactly like when configuring a router or a switch as it has its own CLI. you can check it out if your are interested
properties (22)
post_id52,101,950
authorwisdomdavid
permlinkre-henrychidiebere-re-wisdomdavid-re-henrychidiebere-re-wisdomdavid-201867t152559633z-20180607t181211421z
categorysteemstem
json_metadata"{"app": "steemit/0.1", "tags": ["steemstem"]}"
created2018-06-07 18:12:12
last_update2018-06-07 18:15:42
depth4
children1
net_rshares0
last_payout2018-06-14 18:12:12
cashout_time1969-12-31 23:59:59
total_payout_value0.000 SBD
curator_payout_value0.000 SBD
pending_payout_value0.000 SBD
promoted0.000 SBD
body_length511
author_reputation1,190,023,548,895
root_title"computer networking and inter-connectivity Tutorial 2- Network Types, Technologies And Network Security"
beneficiaries[]
max_accepted_payout1,000,000.000 SBD
percent_steem_dollars10,000