What is ARP Poisoning?

ARP poisoning is an attack in which an adversary sends forged ARP messages onto the network with the goal of manipulating the ARP tables of other devices. As a result, traffic is rerouted via the attacker, who can intercept, alter or block it.

In OT networks, ARP poisoning can lead to manipulation of control traffic between PLCs and SCADA systems without users noticing.


🧠 What does ARP do?

  • ARP (Address Resolution Protocol) translates IP addresses into MAC addresses
  • Devices store ARP mappings in a local cache (temporary memory)
  • These ARP tables are not authenticated and are overwritten automatically

🎯 What is ARP poisoning?

In ARP poisoning, an attacker sends forged ARP replies, such as:

“The IP address of the PLC belongs to my MAC address”

Result: the victim then sends traffic to the attacker instead of the real PLC.

This enables:


⚠️ Examples in an OT context

Scenario Effect
Attacker hijacks traffic between SCADA and PLC Faulty control or data manipulation
Historian receives data from the attacker Log files contain manipulated values
Operator believes they are controlling the system, but… …commands are routed via the attacker
Rogue laptop on a guest port Can impersonate an HMI or engineering station

🔐 Security measures

Measure Description
Dynamic ARP Inspection (DAI) Verifies ARP packets against DHCP Snooping data
IP Source Guard Allows only traffic with valid IP/MAC/port combinations
Port Security Limits the number of allowed devices per switch port
MAC Binding Binds known MAC addresses to fixed ports
802.1X Requires authentication for network access
Zero Trust Architecture Verifies all communication, including within the internal OT network

🔍 Detecting ARP poisoning

Method Explanation
ARP cache analysis Identifying duplicate IP/MAC pairs
SIEM rules Alerting on sudden ARP changes
Wireshark or IDS Detecting unusual ARP traffic (frequency, conflicts)
Anomaly detection Analysing behaviour patterns, such as repeated traffic with new MAC addresses

🧪 Tools for simulation or detection

  • arpwatch — monitoring tool for ARP changes
  • ettercap, bettercap — simulation of ARP poisoning (lab environments only)
  • arp -a — manual inspection of ARP tables on Windows/Linux

📌 In summary

ARP poisoning is an invisible attack that can manipulate communication between OT devices. Prevention requires Layer 2 security such as DAI, Port Security and network segmentation.