Open Access

TSCBA-A Mitigation System for ARP Cache Poisoning Attacks


1. Plummer, D. An Ethernet Address Resolution Protocol (RFC 826). Network Working Group, 1982.Search in Google Scholar

2. Prabadevi, B., N. Jeyanthi. A Framework to Mitigate ARP Sniffing Attacks by Cache Poisoning. – International Journal of Advanced Intelligence Paradigms, Vol. 10, 2018, No 1-2, pp. 146-159.10.1504/IJAIP.2018.10010532Search in Google Scholar

3. Abad, C. L., R. I. Bonilla. An Analysis of the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks. – In: 27th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW’07), 2007, p. 60.10.1109/ICDCSW.2007.19Search in Google Scholar

4. Prabadevi, B., N. Jeyanthi. Distributed Denial of Service Attacks and Its Effects on Cloud Environment – A Survey. – In: IEEE 2014 International Symposium on Networks, Computers and Communications, 2014, pp. 1-5.10.1109/SNCC.2014.6866508Search in Google Scholar

5. Jeyanthi, N. N., C. S. N. Iyengar. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005Search in Google Scholar

6. Jeyanthi, N., P. C. Mogan Kumanr. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Search in Google Scholar

7. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002Search in Google Scholar

8. Shukla, S., I. Yadav. An Innovative Method for Detection and Prevention Against ARP Spoofing in MANET. – International Journal of Computer Science and Information Technology & Security, Vol. 5, 2015, No 1, pp. 207-214.Search in Google Scholar

9. Jinhua, G., X. Kejian. ARP Spoofing Detection Algorithm Using ICMP Protocol. – In: 2013 International Conference on Computer Communication and Informatics (ICCCI’13), 2013, pp. 1-6.10.1109/ICCCI.2013.6466290Search in Google Scholar

10. Al-Hemairy, M., S. Amin, Z. Trabelsi. Towards More Sophisticated ARP Spoofing Detection/Prevention Systems in LAN Networks. – In: 2009 International Conference on the Current Trends in Information Technology (CTIT’09), 2009, pp. 1-6.10.1109/CTIT.2009.5423112Search in Google Scholar

11. Srinath, D., S. Panimalar, A. J. Simla, J. Deepa. Detection and Prevention of ARP Spoofing Using Centralized Server. – International Journal of Computer Applications, Vol. 113, 2015, No 19, pp. 26-30.10.5120/19935-1931Search in Google Scholar

12. AbdelSalam, A. M., W. S. Elkilani, K. M. Amin. An Automated Approach for Preventing ARP Spoofing Attack Using Static ARP Entries. – International Journal of Advanced Computer Science and Applications, Vol. 5, 2014, No 1, pp. 96-104.10.14569/IJACSA.2014.050114Search in Google Scholar

13. Barbhuiya, F. A., S. Biswas, S. Nandi. An Active Host-Based Intrusion Detection System for ARP-Related Attacks and Its Verification. – In: International Conference on Computer Science and Information Technology, Springer, Berlin, Heidelberg, 2011, pp. 432-443.Search in Google Scholar

14. Kalajdzic, K., A. Patel. Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. – In: Proc. of 6th International Workshop on Digital Forensics & Incident Analysis, 2011, pp. 81-92.Search in Google Scholar

15. Trabelsi, Z., W. El-Hajj. On Investigating ARP Spoofing Security Solutions. – International Journal of Internet Protocol Technology, Vol. 5, 2010, No 1-2, pp. 92-100.10.1504/IJIPT.2010.032618Search in Google Scholar

16. Pandey, P. Prevention of ARP Spoofing: A Probe Packet Based Technique. – In: 2013 IEEE 3rd International Conference on Advance Computing Conference (IACC’13), 2013, pp. 147-153.10.1109/IAdCC.2013.6514211Search in Google Scholar

17. Kumar, S., S. Tapaswi. A Centralized Detection and Prevention Technique Against ARP Poisoning. – In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, pp. 259-264.10.1109/CyberSec.2012.6246087Search in Google Scholar

18. Arote, P., K. V. Arya. Detection and Prevention Against ARP Poisoning Attack Using Modified ICMP and Voting. – In: 2015 International Conference on Computational Intelligence and Networks (CINE’15), 2015, pp. 136-141.10.1109/CINE.2015.34Search in Google Scholar

19. Tripathi, N., B. M. Mehtre. An ICMP Based Secondary Cache Approach for the Detection and Prevention of ARP Poisoning. – In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC’13), 2013, pp. 1-6.10.1109/ICCIC.2013.6724172Search in Google Scholar

20. Bruschi, D., A. Ornaghi, E. Rosti. S-ARP: A Secure Address Resolution Protocol. – In: Proc. of 19th Annual Computer Security Applications Conference, 2003, pp. 66-74.Search in Google Scholar

21. Lootah, W., W. Enck, P. McDaniel. TARP: Ticket-Based Address Resolution Protocol. –Computer Networks, Vol. 51, No 15, pp. 4322-4337.10.1016/j.comnet.2007.05.007Search in Google Scholar

22. Dangol, S., S. Selvakumar, M. Brindha. Genuine ARP (GARP): A Broadcast Based Stateful Authentication Protocol. – ACM SIGSOFT Software Engineering Notes, Vol. 36, 2011, No 4, pp. 1-10.10.1145/1988997.1989013Search in Google Scholar

Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology