Accesso libero

TSCBA-A Mitigation System for ARP Cache Poisoning Attacks

INFORMAZIONI SU QUESTO ARTICOLO

Cita

1. Plummer, D. An Ethernet Address Resolution Protocol (RFC 826). Network Working Group, 1982.Search in Google Scholar

2. Prabadevi, B., N. Jeyanthi. A Framework to Mitigate ARP Sniffing Attacks by Cache Poisoning. – International Journal of Advanced Intelligence Paradigms, Vol. 10, 2018, No 1-2, pp. 146-159.10.1504/IJAIP.2018.10010532Search in Google Scholar

3. Abad, C. L., R. I. Bonilla. An Analysis of the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks. – In: 27th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW’07), 2007, p. 60.10.1109/ICDCSW.2007.19Search in Google Scholar

4. Prabadevi, B., N. Jeyanthi. Distributed Denial of Service Attacks and Its Effects on Cloud Environment – A Survey. – In: IEEE 2014 International Symposium on Networks, Computers and Communications, 2014, pp. 1-5.10.1109/SNCC.2014.6866508Search in Google Scholar

5. Jeyanthi, N. N., C. S. N. Iyengar. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment. – Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005Search in Google Scholar

6. Jeyanthi, N., P. C. Mogan Kumanr. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDoS Attacks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Search in Google Scholar

7. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDoS Attacks in VoIP Networks. – Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002Search in Google Scholar

8. Shukla, S., I. Yadav. An Innovative Method for Detection and Prevention Against ARP Spoofing in MANET. – International Journal of Computer Science and Information Technology & Security, Vol. 5, 2015, No 1, pp. 207-214.Search in Google Scholar

9. Jinhua, G., X. Kejian. ARP Spoofing Detection Algorithm Using ICMP Protocol. – In: 2013 International Conference on Computer Communication and Informatics (ICCCI’13), 2013, pp. 1-6.10.1109/ICCCI.2013.6466290Search in Google Scholar

10. Al-Hemairy, M., S. Amin, Z. Trabelsi. Towards More Sophisticated ARP Spoofing Detection/Prevention Systems in LAN Networks. – In: 2009 International Conference on the Current Trends in Information Technology (CTIT’09), 2009, pp. 1-6.10.1109/CTIT.2009.5423112Search in Google Scholar

11. Srinath, D., S. Panimalar, A. J. Simla, J. Deepa. Detection and Prevention of ARP Spoofing Using Centralized Server. – International Journal of Computer Applications, Vol. 113, 2015, No 19, pp. 26-30.10.5120/19935-1931Search in Google Scholar

12. AbdelSalam, A. M., W. S. Elkilani, K. M. Amin. An Automated Approach for Preventing ARP Spoofing Attack Using Static ARP Entries. – International Journal of Advanced Computer Science and Applications, Vol. 5, 2014, No 1, pp. 96-104.10.14569/IJACSA.2014.050114Search in Google Scholar

13. Barbhuiya, F. A., S. Biswas, S. Nandi. An Active Host-Based Intrusion Detection System for ARP-Related Attacks and Its Verification. – In: International Conference on Computer Science and Information Technology, Springer, Berlin, Heidelberg, 2011, pp. 432-443.Search in Google Scholar

14. Kalajdzic, K., A. Patel. Active Detection and Prevention of Sophisticated ARP-Poisoning Man-in-the-Middle Attacks on Switched Ethernet LANs. – In: Proc. of 6th International Workshop on Digital Forensics & Incident Analysis, 2011, pp. 81-92.Search in Google Scholar

15. Trabelsi, Z., W. El-Hajj. On Investigating ARP Spoofing Security Solutions. – International Journal of Internet Protocol Technology, Vol. 5, 2010, No 1-2, pp. 92-100.10.1504/IJIPT.2010.032618Search in Google Scholar

16. Pandey, P. Prevention of ARP Spoofing: A Probe Packet Based Technique. – In: 2013 IEEE 3rd International Conference on Advance Computing Conference (IACC’13), 2013, pp. 147-153.10.1109/IAdCC.2013.6514211Search in Google Scholar

17. Kumar, S., S. Tapaswi. A Centralized Detection and Prevention Technique Against ARP Poisoning. – In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012, pp. 259-264.10.1109/CyberSec.2012.6246087Search in Google Scholar

18. Arote, P., K. V. Arya. Detection and Prevention Against ARP Poisoning Attack Using Modified ICMP and Voting. – In: 2015 International Conference on Computational Intelligence and Networks (CINE’15), 2015, pp. 136-141.10.1109/CINE.2015.34Search in Google Scholar

19. Tripathi, N., B. M. Mehtre. An ICMP Based Secondary Cache Approach for the Detection and Prevention of ARP Poisoning. – In: 2013 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC’13), 2013, pp. 1-6.10.1109/ICCIC.2013.6724172Search in Google Scholar

20. Bruschi, D., A. Ornaghi, E. Rosti. S-ARP: A Secure Address Resolution Protocol. – In: Proc. of 19th Annual Computer Security Applications Conference, 2003, pp. 66-74.Search in Google Scholar

21. Lootah, W., W. Enck, P. McDaniel. TARP: Ticket-Based Address Resolution Protocol. –Computer Networks, Vol. 51, No 15, pp. 4322-4337.10.1016/j.comnet.2007.05.007Search in Google Scholar

22. Dangol, S., S. Selvakumar, M. Brindha. Genuine ARP (GARP): A Broadcast Based Stateful Authentication Protocol. – ACM SIGSOFT Software Engineering Notes, Vol. 36, 2011, No 4, pp. 1-10.10.1145/1988997.1989013Search in Google Scholar

eISSN:
1314-4081
Lingua:
Inglese
Frequenza di pubblicazione:
4 volte all'anno
Argomenti della rivista:
Computer Sciences, Information Technology