Results 141 to 150 of about 3,560 (200)
Some of the next articles are maybe not open access.

On investigating ARP spoofing security solutions

International Journal of Internet Protocol Technology, 2010
The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with malicious hosts. By performing ARP spoofing attacks, a malicious host can either impersonate another host [man-in-the-middle attack (MiM) ] and gain access to sensitive information, or perform denial of service attack (DoS) on
Zouheir Trabelsi, Wassim El Hajj
openaire   +1 more source

A security framework against ARP spoofing

2015 4th International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2015
Day by day peoples are going towards internet but they are not have much information about it they only do their work. Attackers take advantage of it by using some network holes. ARP spoofing is one of the holes in networking. ARP (Address resolution protocol) is stateless and unauthenticated protocol at layer 3 and attackers take it as a tool for ...
Ravi Raj Saini, Himanshu Gupta
openaire   +1 more source

A Secure Mechanism to Prevent ARP Spoofing and ARP Broadcasting in SDN

2020 International Conference on Computer Science and Software Engineering (CSASE), 2020
Conventional networks had several security problems, some of them solved using Software Defined Networking SDN and some others still exist such as Address Resolution Protocol ARP spoofing. In this paper, the SDN controller has been extended by a module which checks every ARP packet in the network to detect and stop the possible spoofed ones.
Harman Y. Ibrahim   +3 more
openaire   +1 more source

ARP spoofing detection algorithm using ICMP protocol

2013 International Conference on Computer Communication and Informatics, 2013
Today, there are an increasing number of attack technologies among which ARP spoofing attack is considered as one of the easiest but dangerous method in local area networks. This paper discusses ARP spoofing attack and some related works about it first. On these bases, the paper proposed an efficient algorithm based on ICMP protocol to detect malicious
Gao Jinhua, Xia Kejian
openaire   +1 more source

Detecting ARP Spoofing: An Active Technique

2005
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity of the sender has a long history of being prone to spoofing attacks. ARP spoofing is sometimes the starting point for more sophisticated LAN attacks like denial of service, man in the middle and session hijacking.
Vivek Ramachandran, Sukumar Nandi
openaire   +1 more source

SSL Stripping Technique (DHCP Snooping and ARP Spoofing Inspection)

2022 24th International Conference on Advanced Communication Technology (ICACT), 2021
Detecting and preventing network attacks are necessary for network solidity as any disruption in the network performance resulting from an attack can lead to loss of resources. Though ARP plays a vital role in successful local area network (LAN) communication, its vulnerabilities are used by attackers every day and by far have made it the leading point
Hannah A.S. Adjei   +5 more
openaire   +1 more source

Network Security Management Using ARP Spoofing

2004
IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the ...
Kyohyeok Kwon   +2 more
openaire   +1 more source

Preventing ARP spoofing in WLAN using SHA-512

2013 IEEE International Conference on Computational Intelligence and Computing Research, 2013
In most of the organizations, the use of Wireless Local Area Network (WLAN) is increasing promisingly. WLAN security is mainly affected by two internal attacks: Rogue Access Point (RAP) and Rogue Dynamic Host Configuration Protocol (DHCP) Server. Rogue Access Point is installed either by employees or by hackers. Employees install rogue access point for
Neha Agrawal   +2 more
openaire   +1 more source

Preventing ARP Spoofing Attacks through Gratuitous Decision Packet

2012 11th International Symposium on Distributed Computing and Applications to Business, Engineering & Science, 2012
Owing to its great need for mapping an IP address to the corresponding MAC address over an Ethernet topology, Address Resolution Protocol (ARP) has been, and still is, capable of accomplishing this task efficiently. At the same time, it suffers from some security shortcomings, because of the malicious hosts have the possibility of poisoning the ARP ...
Haider Salim   +3 more
openaire   +1 more source

ARP Spoofing Based Access Control for DLNA Devices

2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
With the prevalence of digital content and Internet, a variety of digital applications and intelligent home applications are involved in daily family life. DLNA (Digital Living Network Alliance) has provided standard guidelines to improve the interoperability of DLNA-capable devices and to enhance the usability of digital contents through DLNA ...
Yong Wu, Xiaoli Zhi
openaire   +1 more source

Home - About - Disclaimer - Privacy