Results 1 to 10 of about 3,560 (200)

DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments [PDF]

open access: yesThe Scientific World Journal, 2014
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments.
Min Su Song   +4 more
doaj   +2 more sources

D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing

open access: yesIEEE Access, 2022
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj   +2 more sources

SFARP: a multi-layered real-time security framework for hybrid ARP and DDoS attack defense in SD-IoT networks [PDF]

open access: yesScientific Reports
The rapid expansion of Software-Defined Internet of Things (SD-IoT) networks has amplified both scalability and vulnerability, exposing them to increasingly sophisticated multi-vector attacks such as flooding-based Distributed Denial-of-Service (DDoS ...
Ameer El-Sayed   +3 more
doaj   +2 more sources

Cyber attack evaluation dataset for deep packet inspection and analysis [PDF]

open access: yesData in Brief, 2023
To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has
Shishir Kumar Shandilya   +3 more
doaj   +2 more sources

Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments [PDF]

open access: yesSensors
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems.
Easa Alalwany   +5 more
doaj   +2 more sources

Smart defense based on explainable stacked machine learning architecture for securing internet of health things with K-means clustering [PDF]

open access: yesScientific Reports
The Internet of Health Things (IoHT) transformed current healthcare by facilitating real-time patient monitoring and remote diagnosis via networked medical equipment.
Tanzila Saba   +5 more
doaj   +2 more sources

A n efficient mechanism to detect and mitigate an ARP spoofing attack in software-defined networks [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2021
The work focuses on software-defined network security, as it was always one of these foremost critical concerns due to the centralized nature in SDN architecture where many serious attacks in traditional networks still appear in SDN networks such as ARP ...
Ghadeer Darwesh   +2 more
doaj   +1 more source

Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory

open access: yesSystems, 2023
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attractive
Tze Uei Chai   +3 more
doaj   +1 more source

TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack

open access: yesJurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), 2023
According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%.
Agus Wijayanto, Imam Riadi, Yudi Prayudi
doaj   +1 more source

ASD: ARP Spoofing Detector Using OpenWrt

open access: yesSecurity and Communication Networks, 2022
The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP ...
Yeonseon Jeong   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy