Tool and Usage
Why this tool?
The primary goal of this solution is to prevent ARP spoofing by other computers on the local network. It uses a whitelist and blocks all other systems sending possible malicious ARP requests (e.g. with spoofing attack).
How it works
SCUTUM uses arptables and iptables to filter traffic. With arptables, it can filter traffic on the second OSI layer, where ARP requests are being handled.
Usage and audience
SCUTUM is commonly used for firewall management or network traffic filtering. Target users for this tool are security professionals and system administrators.
- Command line interface
- Graphical user interface
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + The source code of this software is available
- - Full name of author is unknown
Supported operating systems
SCUTUM is known to work on Linux.
Similar tools to SCUTUM:
CHIRON is a tool to provide network analytics based on the ELK stack with threat detection. Learn how it works in this review.
Anti-DDOS is an open source software project developed to protect against DDoS attacks. The project consists of a shell script to set up iptables for traffic filtering. Additionally, it will configure kernel parameters to better withstand lots of network traffic.
The iptables tool is the userspace command line program part of the netfilter project. Since Linux 2.4 it is the standard packet filtering engine. Among standard traffic filtering, it can be used for Network Address Translation (NAT).
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
This tool is categorized as a network defense tool and network traffic filtering tool.