heroui logo

Detect ARP Poisoning

Splunk Security Content

View Source
Summary
The "Detect ARP Poisoning" rule is designed to identify ARP Poisoning attacks by monitoring Dynamic ARP Inspection (DAI) errors reported by Cisco network devices. By analyzing logs for specific events generated when DAI disables interfaces due to suspicious activity, this detection mechanism aims to uncover attempts by attackers to manipulate ARP communications, which can lead to interception or modification of network traffic. Such attacks typically allow adversaries to engage in man-in-the-middle operations, compromising both the integrity and confidentiality of data flows across the local network. The rule leverages the logs from Cisco devices and is contingent on proper configuration of DHCP Snooping and DAI to minimize false positives resulting from misconfigurations or excessive legitimate ARP traffic. The overall goal is to enable timely detection and response to potential threats originating from ARP-related anomalies in network behavior.
Categories
  • Network
Data Sources
  • Network Traffic
  • Application Log
ATT&CK Techniques
  • T1200
  • T1498
  • T1557
  • T1557.002
Created: 2024-11-15