DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments [PDF]
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments.
Min Su Song +4 more
doaj +2 more sources
D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an unauthorized third party secretly accesses the communication between two ...
Sabah M. Morsy, Dalia Nashat
doaj +2 more sources
SFARP: a multi-layered real-time security framework for hybrid ARP and DDoS attack defense in SD-IoT networks [PDF]
The rapid expansion of Software-Defined Internet of Things (SD-IoT) networks has amplified both scalability and vulnerability, exposing them to increasingly sophisticated multi-vector attacks such as flooding-based Distributed Denial-of-Service (DDoS ...
Ameer El-Sayed +3 more
doaj +2 more sources
Cyber attack evaluation dataset for deep packet inspection and analysis [PDF]
To determine the effectiveness of any defense mechanism, there is a need for comprehensive real-time network data that solely references various attack scenarios based on older software versions or unprotected ports, and so on. This presented dataset has
Shishir Kumar Shandilya +3 more
doaj +2 more sources
Stacking Ensemble Deep Learning for Real-Time Intrusion Detection in IoMT Environments [PDF]
The Internet of Medical Things (IoMT) is revolutionizing healthcare by enabling advanced patient care through interconnected medical devices and systems.
Easa Alalwany +5 more
doaj +2 more sources
Smart defense based on explainable stacked machine learning architecture for securing internet of health things with K-means clustering [PDF]
The Internet of Health Things (IoHT) transformed current healthcare by facilitating real-time patient monitoring and remote diagnosis via networked medical equipment.
Tanzila Saba +5 more
doaj +2 more sources
A n efficient mechanism to detect and mitigate an ARP spoofing attack in software-defined networks [PDF]
The work focuses on software-defined network security, as it was always one of these foremost critical concerns due to the centralized nature in SDN architecture where many serious attacks in traditional networks still appear in SDN networks such as ARP ...
Ghadeer Darwesh +2 more
doaj +1 more source
Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attractive
Tze Uei Chai +3 more
doaj +1 more source
TAARA Method for Processing on the Network Forensics in the Event of an ARP Spoofing Attack
According to reports in 2021 by Kaspersky, requests for investigations into suspicious network activity, such as ARP Spoofing, which can result in sophisticated attacks, reached up to 22%.
Agus Wijayanto, Imam Riadi, Yudi Prayudi
doaj +1 more source
ASD: ARP Spoofing Detector Using OpenWrt
The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP ...
Yeonseon Jeong +2 more
openaire +1 more source

