Results 151 to 160 of about 3,560 (200)
Some of the next articles are maybe not open access.
An active DES based IDS for ARP spoofing
2011 IEEE International Conference on Systems, Man, and Cybernetics, 2011A network Intrusion Detection System (IDS) is a device or software that monitors network activities and raises alerts on detection of malicious behavior. State-transition based framework like Finite State Machines (FSM), extended FSM, timed FSM, Discrete Event Systems (DES) etc.
F.A. Barbhuiya, S Biswas, S Nandi
openaire +1 more source
Sniffing Packets on LAN without ARP Spoofing
2008 Third International Conference on Convergence and Hybrid Information Technology, 2008Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our systems) are regarded as essential security methods, especially on the LAN system which uses ARP protocol with holes enabling hackers to conduct ARP spoof and sniff packets on the LAN systems.
openaire +1 more source
Mitigating ARP Spoofing Attacks in Software-Defined Networks
2015 25th International Conference on Computer Theory and Applications (ICCTA), 2015Software-Defined Networks (SDN) are emerging as an attractive solution to overcome the limitations of traditional networks. They provide network programmability and promote rapid innovation in protocol design, network management and network security.
Ahmed M. AbdelSalam +2 more
openaire +1 more source
The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table
2018 International Conference on Sustainable Information Engineering and Technology (SIET), 2018Securing the user’s data that pass through the internet is a very important challenge until today. One of the threats is the attacks on the data link layer such as ARP spoofing. Those attacks exploit the vulnerability of the ARP protocol. One of the most basic but effective solution to mitigate this type of attack is adding MAC and IP address to the ...
openaire +1 more source
ARP Spoofing in Launching Man-in-the-Middle Attack
2023Man-in-the-Middle (MITM) attack is a typical eavesdropping cyberattack. The attacker can launch a MITM attack whenever the attacker and victims are on the same network. Here is a scenario: A MITM attacker connects to Subway’s Wi-Fi and waits for the victim to connect to the Subway Wi-Fi.
Soon Qi Huan, Vinesha Selvarajah
openaire +1 more source
Identifying ARP Spoofing Through Active Strategies
Due to its stateless nature and absence of authentication mechanisms to verify sender identity, the Address Resolution Protocol (ARP) has long been susceptible to spoofing attacks. ARP spoofing often serves as a gateway to more advanced attacks on local area networks, such as denial of service, man-in-the-middle, and session hijacking.Ashok Bawge, Dr.Harish Joshi
openaire +1 more source
Spoofed ARP Packets Detection in Switched LAN Networks
2008Spoofed ARP packets are used by malicious users to redirect network’s traffic to their hosts. The potential damage to a network from an attack of this nature can be very important. This paper discusses first how malicious users redirect network traffic using spoofed ARP packets. Then, the paper proposes a practical and efficient mechanism for detecting
Zouheir Trabelsi, Khaled Shuaib
openaire +1 more source
A Proposal for a Schema for ARP Spoofing Protection
Applied Mechanics and Materials, 2013IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet.
Jin Cherng Lin +2 more
openaire +1 more source
Predicting ARP spoofing with Machine Learning
2022 International Conference on Emerging Trends in Smart Technologies (ICETST), 2022Mehak Usmani +4 more
openaire +1 more source
An interactive visualization tool for teaching ARP spoofing attack
2017 IEEE Frontiers in Education Conference (FIE), 2017Local area network (LAN) access is the top vector for insider threats and misuses according to the Verizon's Data Breach Investigations Report. Address Resolution Protocol (ARP) is often exploited by the attackers who have gained access to the LAN. It is critical for students to learn how attacks on ARP work and know the countermeasures.
Brandon Scott +7 more
openaire +1 more source

