Results 11 to 20 of about 3,560 (200)

Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking

open access: yesJournal of Information Security and Cybercrimes Research, 2022
Software Defined Networking (SDN) shows network operations to be performed for efficient network operations. Due to the increase in network devices, the percentage of attacks is also increased, and it is  challenging to provide defense against such ...
Faisal jamil, Harun Jamil, Abid Ali
doaj   +1 more source

A Survey on Consensus Protocols and Attacks on Blockchain Technology

open access: yesApplied Sciences, 2023
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.
Abhishek Guru   +5 more
doaj   +1 more source

Improved Secure Address Resolution Protocol [PDF]

open access: yes, 2014
In this paper, an improved secure address resolution protocol is presented where ARP spoofing attack is prevented. The proposed methodology is a centralised methodology for preventing ARP spoofing attack.
Chaurasia, Vijay Kumar   +2 more
core   +1 more source

Blockchain-based ARP defense scheme

open access: yes网络与信息安全学报, 2018
In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The ...
Fanming LIU,Wei SHI
doaj   +3 more sources

Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot [PDF]

open access: yes, 2018
The rise of connectivity, digitalization, robotics, and artificial intelligence (AI) is rapidly changing our society and shaping its future development.
Cerrudo Cesar   +13 more
core   +2 more sources

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities [PDF]

open access: yes, 2020
Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches.
Ho, Anthony T. S.   +6 more
core   +2 more sources

Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic

open access: yesEgyptian Informatics Journal, 2022
Ethernet is one of the widespread protocols residing in the second layer of the seven-layers Open Systems Interconnection (OSI) model. Ethernet offers various advantages which enable its widespread use in all types of network topology and becomes an ...
Munther Numan Munther   +4 more
doaj   +1 more source

ARP Modification for Prevention of IP Spoofing [PDF]

open access: yesJournal of information and communication convergence engineering, 2014
The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP
Jung-Ha Kang   +3 more
openaire   +1 more source

An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2014
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service (DoS) attacks or Man in the middle (MITM) attacks.
Ahmed M., Wail S.Elkilani, Khalid M.Amin
openaire   +1 more source

Enhancing Intrusion Detection in IoT Communications Through ML Model Generalization With a New Dataset (IDSAI)

open access: yesIEEE Access, 2023
One of the fields where Artificial Intelligence (AI) must continue to innovate is computer security. The integration of Wireless Sensor Networks (WSN) with the Internet of Things (IoT) creates ecosystems of attractive surfaces for security intrusions ...
Gutierrez-Portela Fernando   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy