Assurance and Security

1
Principles of Information Assurance and Security: SEC 511-01
Homework #2
ARP Poisoning Attack and Countermeasures
Due Date: October, 15, 2022
1 Overview
The students are required to investigate the ARP poisoning attack and its countermeasures. This is an
individual assignment where each student is required to setup a virtual environment where there is an
attacker executes the ARP poisoning attack on at least one victim and show the results. In addition, the
student has to implement at least one countermeasure to this attack and show the results.
You are required to set up a virtual environment with 2 virtual machines:
• Attacker’s VM: This machine poisons the victims ARP table.
• Victim’s VM: This machine acts as the victim and its ARP table is poisoned by the attacker.
Then, you have to show normal operation, where the victim exchanges information with a third party
without their packets being forwarded through the attacker. After that, you must show how the attack
is launched against the victim by the attacker. Finally, you have to show the operation while the victim
is under attack (i.e how their packets are being forwarded through the attacker’s machine).
2 Submission details
The assignment is graded out of 100 points and the students are required to submit the following:
• (30 pts) A written report and all implementation code, which includes the following:
– (20 pts) Written report, which contains the following sections:
∗ (5 pts) A section explaining the ARP poisoning attack theoretically.
∗ (8 pts) A section on the possible countermeasures to this attack.
∗ (2 pts) A section that discusses the selected countermeasure you want to deploy. It must include
your reasoning for selecting this particular countermeasure, its strengths and weaknesses
∗ (3 pts) A section detailing the environment and all the tools you used in this assignment.
∗ (2 pts) A section discussing the outcomes of this assignment, from your perspective.
– (10 pts) Implementation code, which contains two text files as follows:
2
∗ (6 pts) Attacker.txt: which contains all the commands that you execute on the attackers
machine with a comment above each command briefly explaining what it does. If any
Python/C etc.. code is used, then it must be included in a separate file and referenced in
Attacker.txt with its function.
∗ (4 pts) Victim.txt: which contains all the commands that you execute on the victims
machine with a comment above each command explaining what it does. If any Python/C
etc.. code is used, then it must be included and explained in a separate file and referenced
in Victim.txt with its function.
• (70 pts) A live demo video of the attack with narration by the student, which includes the
following in order:
1. (5 pts) Describe the environment: Describe the virtual machines and how they are
connected.
2. (5 pts) Show and explain normal operation of the victims machine. You must show that
packets are not being forwarded through the attackers machine
3. (5 pts) Show and explain the ARP table of the victims machine during normal operation.
4. (5 pts) Describe the attacker’s machine and the tools you will use.
5. (5 pts) Show and explain how the attack is launched by the attacker.
6. (5 pts) Show and explain the ARP table of the victim’s machine when it is under attack.
7. (5 pts) Show and explain the operation of the victims machine when it is under attack. You
must show that packets are being forwarded through the attackers machine.
8. (20 pts) Show and explain how the countermeasure is deployed.
9. (5 pts) Relaunch the attack after deploying your selected countermeasure and show the
results.
10.(10 pts) Compare and explain the ARP tables from all three operation modes: normal, under
attack, under attack with countermeasure.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more