What is ARP Spoofing?
ARP Spoofing is an attack technique in which an attacker sends forged ARP messages to bind their MAC address to the IP address of another device. This allows network traffic to be intercepted, redirected or manipulated.
In OT networks, ARP Spoofing can result in the takeover of communication between, for example, a PLC and a SCADA system — without the operator noticing.
🧠 How does ARP (Address Resolution Protocol) work?
- ARP translates IP addresses into MAC addresses (Layer 3 to Layer 2)
- Each device builds an ARP cache of IP→MAC mappings
- These tables are trust-based and can easily be overwritten
🎯 What is ARP Spoofing?
In ARP Spoofing, an attacker impersonates another device on the network:
- The attacker sends an ARP reply to a victim with:
- “PLC’s IP = my MAC”
- The victim now sends its traffic to the attacker
- The attacker performs a Man-In-The-Middle attack or disrupts traffic
⚠️ Consequences in OT environments
| Impact | Description |
|---|---|
| Loss of trust | Sensor or PLC data can be manipulated |
| Process interruption | Traffic can be interrupted or delayed |
| Invisible access | Attackers can eavesdrop without leaving traces |
| Disruption of alarms/logs | The Historian or SCADA receives faulty data |
| Risk of escalation | The attacker may gain access to management functions |
🔍 How do you spot ARP Spoofing?
| Detection method | Description |
|---|---|
| Dynamic ARP Inspection (DAI) | Blocks unwanted ARP replies based on DHCP Snooping |
| Comparing ARP tables | Detecting duplicate IP/MAC combinations |
| IDS or SIEM | Recognising anomalous ARP traffic or repeated ARP messages |
| Network monitoring with Wireshark | Visualising ARP floods or manipulation attempts |
🛡️ Protection measures
| Measure | Description |
|---|---|
| Dynamic ARP Inspection | Blocks spoofed ARP on untrusted ports |
| DHCP Snooping | Builds the baseline binding for ARP validation |
| IP Source Guard | Verifies IP/MAC at port level |
| MAC Binding + Port Security | Only known devices allowed per port |
| VLAN segmentation | Limits the impact of spoofing to a small part of the network |
| Zero Trust Architecture | Trust no internal traffic without verification |
🧪 Simulation and testing
Want to test ARP Spoofing in a lab environment?
- Tools:
arpspoof,ettercap,Bettercap - Observe behaviour in Wireshark and inspect the ARP table on the victim device
- Use test VLANs — never apply in production!
📌 In summary
ARP Spoofing is an invisible but dangerous attack technique that can manipulate OT traffic. Protect your network with Layer 2 security such as DAI, IP Source Guard and proper port control.
