Results 151 to 160 of about 3,560 (200)
Some of the next articles are maybe not open access.

An active DES based IDS for ARP spoofing

2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011
A network Intrusion Detection System (IDS) is a device or software that monitors network activities and raises alerts on detection of malicious behavior. State-transition based framework like Finite State Machines (FSM), extended FSM, timed FSM, Discrete Event Systems (DES) etc.
F.A. Barbhuiya, S Biswas, S Nandi
openaire   +1 more source

Sniffing Packets on LAN without ARP Spoofing

2008 Third International Conference on Convergence and Hybrid Information Technology, 2008
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our systems) are regarded as essential security methods, especially on the LAN system which uses ARP protocol with holes enabling hackers to conduct ARP spoof and sniff packets on the LAN systems.
openaire   +1 more source

Mitigating ARP Spoofing Attacks in Software-Defined Networks

2015 25th International Conference on Computer Theory and Applications (ICCTA), 2015
Software-Defined Networks (SDN) are emerging as an attractive solution to overcome the limitations of traditional networks. They provide network programmability and promote rapid innovation in protocol design, network management and network security.
Ahmed M. AbdelSalam   +2 more
openaire   +1 more source

The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table

2018 International Conference on Sustainable Information Engineering and Technology (SIET), 2018
Securing the user’s data that pass through the internet is a very important challenge until today. One of the threats is the attacks on the data link layer such as ARP spoofing. Those attacks exploit the vulnerability of the ARP protocol. One of the most basic but effective solution to mitigate this type of attack is adding MAC and IP address to the ...
openaire   +1 more source

ARP Spoofing in Launching Man-in-the-Middle Attack

2023
Man-in-the-Middle (MITM) attack is a typical eavesdropping cyberattack. The attacker can launch a MITM attack whenever the attacker and victims are on the same network. Here is a scenario: A MITM attacker connects to Subway’s Wi-Fi and waits for the victim to connect to the Subway Wi-Fi.
Soon Qi Huan, Vinesha Selvarajah
openaire   +1 more source

Identifying ARP Spoofing Through Active Strategies

Due to its stateless nature and absence of authentication mechanisms to verify sender identity, the Address Resolution Protocol (ARP) has long been susceptible to spoofing attacks. ARP spoofing often serves as a gateway to more advanced attacks on local area networks, such as denial of service, man-in-the-middle, and session hijacking.
Ashok Bawge, Dr.Harish Joshi
openaire   +1 more source

Spoofed ARP Packets Detection in Switched LAN Networks

2008
Spoofed ARP packets are used by malicious users to redirect network’s traffic to their hosts. The potential damage to a network from an attack of this nature can be very important. This paper discusses first how malicious users redirect network traffic using spoofed ARP packets. Then, the paper proposes a practical and efficient mechanism for detecting
Zouheir Trabelsi, Khaled Shuaib
openaire   +1 more source

A Proposal for a Schema for ARP Spoofing Protection

Applied Mechanics and Materials, 2013
IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet.
Jin Cherng Lin   +2 more
openaire   +1 more source

Predicting ARP spoofing with Machine Learning

2022 International Conference on Emerging Trends in Smart Technologies (ICETST), 2022
Mehak Usmani   +4 more
openaire   +1 more source

An interactive visualization tool for teaching ARP spoofing attack

2017 IEEE Frontiers in Education Conference (FIE), 2017
Local area network (LAN) access is the top vector for insider threats and misuses according to the Verizon's Data Breach Investigations Report. Address Resolution Protocol (ARP) is often exploited by the attackers who have gained access to the LAN. It is critical for students to learn how attacks on ARP work and know the countermeasures.
Brandon Scott   +7 more
openaire   +1 more source

Home - About - Disclaimer - Privacy