Academic literature on the topic 'Address resolution protocol spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Address resolution protocol spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Address resolution protocol spoofing"

1

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
APA, Harvard, Vancouver, ISO, and other styles
2

Ashok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.

Full text
Abstract:
<em>Due to its stateless nature and absence of authentication mechanisms to verify sender identity, the Address Resolution Protocol (ARP) has long been susceptible to spoofing attacks. ARP spoofing often serves as a gateway to more advanced attacks on local area networks, such as denial of service, man-in-the-middle, and session hijacking. Most existing detection methods adopt a passive approach by monitoring ARP traffic for anomalies in the IP-to-Ethernet address mappings. However, this strategy suffers from a delayed response time, often identifying an attack only after it has already caused harm. In this paper, we introduce an active detection technique for ARP spoofing. By injecting ARP request and TCP SYN packets into the network, we proactively probe for mismatches in address mappings. Compared to passive methods, our approach is faster, more intelligent, scalable, and reliable. Additionally, it enhances accuracy in identifying the true MAC-to-IP address associations during an attack scenario.</em>
APA, Harvard, Vancouver, ISO, and other styles
3

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.

Full text
Abstract:
The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain an unfair advantage. The research recommends developing a security system recognising and preventing ARP spoofing attacks. This system detects ARP spoofing attempts by comparing the static MAC address of the original router to the router's MAC address in the ARP cache table. After detecting the attack using information collected from the router's MAC address in the ARP cache table, the system will conduct a de-authentication attack against the attacker's MAC address. If the attacker is disconnected from the WLAN, they cannot perform ARP spoofing attacks. This system is operated using a Raspberry Pi Model B. Most ARP spoofing attacks can be detected in 0.93 seconds, and responding takes 3.05 seconds.
APA, Harvard, Vancouver, ISO, and other styles
4

Herman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.

Full text
Abstract:
The rapid development of wireless technology has made network communication more accessible but also increasingly vulnerable to security threats. One of the major threats is the Man-in-the-Middle (MitM) Attack, particularly ARP Spoofing, which manipulates the Address Resolution Protocol (ARP) to intercept or alter network traffic. ARP Spoofing, also known as ARP Poisoning, allows attackers to associate incorrect MAC addresses with IP addresses, enabling unauthorized access and potential data interception. This research focuses on the detection and investigation of ARP Spoofing on MikroTik routers using live forensic methods. The study utilizes Wireshark as a primary tool to monitor ARP-based network activity and identify anomalies indicative of ARP Spoofing attacks. The National Institute of Standards and Technology (NIST) forensic framework, which includes Collection, Examination, Analysis, and Reporting, is employed as a methodology for analyzing forensic evidence. The research also incorporates a virtualized attack simulation environment using VirtualBox, where a PC Client acts as the target, an attacker PC executes an ARP Spoofing attack using Ettercap, and Wireshark captures network traffic for forensic examination. The simulation results reveal that an ARP Spoofing attack can successfully manipulate network traffic by altering ARP table entries. The attacker assumes the identity of IP Address 192.168.0.1 with MAC Address e8-cc-18-41-3f-fb, while the target’s identity is duplicated as 192.168.0.19 with MAC Address 08:00:27:15:4c:3c, as confirmed through Wireshark analysis and ARP table inspection using the command prompt. These findings emphasize the importance of implementing proactive security measures, such as Dynamic ARP Inspection (DAI), encryption protocols, and continuous network monitoring, to mitigate the risks associated with ARP Spoofing attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Jui-Pin. "Web-Based Enterprise Management-Address Resolution Protocol: An Efficient Scheme for Preventing Address Resolution Protocol Spoofing." Advanced Science, Engineering and Medicine 7, no. 11 (2015): 1003–6. http://dx.doi.org/10.1166/asem.2015.1796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al Sukkar, Ghazi, Ramzi Saifan, Sufian Khwaldeh, Mahmoud Maqableh, and Iyad Jafar. "Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense." Communications and Network 08, no. 03 (2016): 118–30. http://dx.doi.org/10.4236/cn.2016.83012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammad Daud. "Detection of ARP Spoofing Attack by using ETTERCAP." Advances in Nonlinear Variational Inequalities 28, no. 4s (2025): 560–71. https://doi.org/10.52783/anvi.v28.3512.

Full text
Abstract:
In our day-to-day life, we share or communicate over the internet in so many ways but to share or communicate we use some set of protocols so that we can send the information. ARP (Address Resolution Protocol) is one of them to communicate over the internet, but there are some chances of being spoofed by using the Address Resolution Protocol as attackers can steal your sensitive information through a Man-In-the-Middle attack. In this attack, a third person can be impersonated or spoofed the IP and we call it an IP spoofing attack. Therefore, to detect this attack we have used the Ettercap tool for detecting the ARP spoofing. In this detection method, we gave an approach in which Ettercap monitors the network and it is a modified Python-based script that is capable of sniffing the ARP packet transmission between the clients. Therefore, Ettercap is used for detecting ARP spoofing which is experimentally studied.
APA, Harvard, Vancouver, ISO, and other styles
8

Mehta, Suma B., and A. Rengarajan. "A Survey on ARP Poisoning." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 02 (2024): 1031–37. http://dx.doi.org/10.15680/ijircce.2024.1202051.

Full text
Abstract:
This paper's primary goal is to examine the detection and mechanism of ARP spoofing. One may argue that the Address Resolution Protocol, or ARP for simple terms, is crucial to computer science and forensics. ARP spoofing is one of the various computers hacking techniques used nowadays by individuals to transmit phony ARP packets across a Local Area Network (LAN). Such attacks might lead to changes in traffic patterns or, worse yet, a temporary or permanent stoppage of traffic. Even though this attack is only possible on networks with Address Resolution Protocols, ARP spoofing can be a precursor to more dangerous assaults that have the potential to do considerably more harm. An attacker seeking to launch this sort of attack will search for the Address Resolution Protocol's vulnerabilities. He may, for instance, be trying to take advantage of flaws like the message's inability to properly verify the sender. Because of this, hackers may find it very simple to alter or steal users' data. Because ARP spoofing poses a genuine risk to the security of every user on the network, all appropriate precautions must be taken to minimize harm.
APA, Harvard, Vancouver, ISO, and other styles
9

Nasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.

Full text
Abstract:
Address Resolution Protocol (ARP) is used to resolve a host’s MAC address, given its IP address. ARP is stateless, as there is no authentication when exchanging a MAC address between the hosts. Hacking tactics using ARP spoofing are constantly being abused differently; many previous studies have prevented such attacks. However, prevention requires modification of the underlying network protocol or additional expensive equipment, so applying these methods to the existing network can be challenging. In this paper, we examine the limitations of previous research in preventing ARP spoofing. In addition, we propose a defense mechanism that does not require network protocol changes or expensive equipment. Before sending or receiving a packet to or from any device on the network, our method checks the MAC and IP addresses to ensure they are correct. It protects users from ARP spoofing. The findings demonstrate that the proposed method is secure, efficient, and very efficient against various threat scenarios. It also makes authentication safe and easy and ensures data and users’ privacy, integrity, and anonymity through strong encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
10

Hafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.

Full text
Abstract:
Pada jaringan komputer, protokol yang bertugas untuk untuk menerjemahkan IP address menjadi MAC Address adalah Address Resolution Protocol (ARP). Sifat stateless pada protokol ARP, menyebabkan protokol ARP memiliki celah dari segi keamanan. Celah ini dapat menimbulkan serangan terhadap ARP Protocol, disebabkan karena ARP request yang dikirimkan secara broadcast, sehingga semua host yang berada pada satu broadcast domain dapat merespon pesan ARP tersebut walaupun pesan tersebut bukan ditujukan untuknya. Serangan inilah yang biasa disebut dengan ARP Spoofing. Serangan ini dapat berimbas pada serangan-serangan yang lain, seperti serangan Man In The Middle Attack, Packet Sniffing, dan Distributed Denial of Service. Metode Live Forensic digunakan untuk mengidentifikasi dan mendeteksi serangan ketika sistem dalam keadaan menyala. Berdasarkan hasil penelitian yang dilakukan terbukti bahwa dengan penggunaan metode Live Forensics, investigator dapat dengan cepat mendeteksi suatu serangan dan mengidentifikasi penyerangnya.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Address resolution protocol spoofing"

1

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
2

Becher, Mike. "Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, Universitätsbibliothek Chemnitz, 1998. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-199801481.

Full text
Abstract:
Thema dieser Arbeit ist die Entwicklung eines Kommunikationsteilsystems fuer das Experimentiersystem CHEOPS zur Ermoeglichung einer Interobjektkommunika- tion zwischen Objekten auf dem gleichen bzw. verschiedenen Systemen. Ausgangspunkte stellen dabei eine verfuegbare Implementation eines Ethernet- Treibers der Kartenfamilie WD80x3 fuer MS-DOS, eine geforderte Kommunikations- moeglichkeit mit UNIX-Prozessen sowie die dort benutzbaren Protokoll-Familien dar. Die Arbeit beschaeftigt sich mit der Analyse und Konzipierung des Ethernet- Treibers sowie der Internet-Protokoll-Familie fuer CHEOPS als auch deren Implementation resultierend in einem minimalen Grundsystem. Weiterhin wird ein erster Entwurf fuer ein spaeter weiterzuentwickelndes bzw. zu vervoll- staendigendes Netz-Interface vorgeschlagen und durch eine Beispiel-Implemen- tierung belegt.
APA, Harvard, Vancouver, ISO, and other styles
3

"Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem." Master's thesis, siehe Literaturverzeichnis, 1998. https://monarch.qucosa.de/id/qucosa%3A17525.

Full text
Abstract:
Thema dieser Arbeit ist die Entwicklung eines Kommunikationsteilsystems fuer das Experimentiersystem CHEOPS zur Ermoeglichung einer Interobjektkommunika- tion zwischen Objekten auf dem gleichen bzw. verschiedenen Systemen. Ausgangspunkte stellen dabei eine verfuegbare Implementation eines Ethernet- Treibers der Kartenfamilie WD80x3 fuer MS-DOS, eine geforderte Kommunikations- moeglichkeit mit UNIX-Prozessen sowie die dort benutzbaren Protokoll-Familien dar. Die Arbeit beschaeftigt sich mit der Analyse und Konzipierung des Ethernet- Treibers sowie der Internet-Protokoll-Familie fuer CHEOPS als auch deren Implementation resultierend in einem minimalen Grundsystem. Weiterhin wird ein erster Entwurf fuer ein spaeter weiterzuentwickelndes bzw. zu vervoll- staendigendes Netz-Interface vorgeschlagen und durch eine Beispiel-Implemen- tierung belegt.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Address resolution protocol spoofing"

1

Weik, Martin H. "address resolution protocol." In Computer Science and Communications Dictionary. Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_361.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Francis Xavier Christopher, D., and C. Divya. "Address Resolution Protocol Based Attacks: Prevention and Detection Schemes." In Lecture Notes on Data Engineering and Communications Technologies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24643-3_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

León, Elvia, Brayan S. Reyes Daza, and Octavio J. Salcedo Parra. "Evaluation of Reliability and Security of the Address Resolution Protocol." In Future Data and Security Engineering. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26135-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fromme, Michael, Lutz Grüneberg, and Helmut Pralle. "An address resolution and key exchange protocol for conferencing applications on the Internet." In Interactive Distributed Multimedia Systems and Telecommunication Services. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0055303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Czerner, Philipp, Javier Esparza, and Valentin Krasotin. "A Resolution-Based Interactive Proof System for UNSAT." In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-57231-9_6.

Full text
Abstract:
AbstractModern SAT or QBF solvers are expected to produce correctness certificates. However, certificates have worst-case exponential size (unless $$\textsf{NP}=\textsf{coNP}$$ NP = coNP ), and at recent SAT competitions the largest certificates of unsatisfiability are starting to reach terabyte size.Recently, Couillard, Czerner, Esparza, and Majumdar have suggested to replace certificates with interactive proof systems based on the $$\textsf {IP}=\textsf {PSPACE}$$ IP = PSPACE theorem. They have presented an interactive protocol between a prover and a verifier for an extension of QBF. The overall running time of the protocol is linear in the time needed by a standard BDD-based algorithm, and the time invested by the verifier is polynomial in the size of the formula. (So, in particular, the verifier never has to read or process exponentially long certificates). We call such an interactive protocol competitive with the BDD algorithm for solving QBF.While BDD-algorithms are state-of-the-art for certain classes of QBF instances, no modern (UN)SAT solver is based on BDDs. For this reason, we initiate the study of interactive certification for more practical SAT algorithms. In particular, we address the question whether interactive protocols can be competitive with some variant of resolution. We present two contributions. First, we prove a theorem that reduces the problem of finding competitive interactive protocols to finding an arithmetisation of formulas satisfying certain commutativity properties. (Arithmetisation is the fundamental technique underlying the $$\textsf {IP}=\textsf {PSPACE}$$ IP = PSPACE theorem.) Then, we apply the theorem to give the first interactive protocol for the Davis-Putnam resolution procedure.
APA, Harvard, Vancouver, ISO, and other styles
6

Bruschi, Danilo, Andrea Di Pasquale, Silvio Ghilardi, Andrea Lanzi, and Elena Pagani. "Formal Verification of ARP (Address Resolution Protocol) Through SMT-Based Model Checking - A Case Study -." In Lecture Notes in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66845-1_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Goralski, Walter. "Address Resolution Protocol." In The Illustrated Network. Elsevier, 2017. http://dx.doi.org/10.1016/b978-0-12-811027-0.00006-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Goralski, Walter. "Address Resolution Protocol." In The Illustrated Network. Elsevier, 2009. http://dx.doi.org/10.1016/b978-0-12-374541-5.50011-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Falb, Jürgen. "ARP — Address Resolution Protocol." In Industrial Electronics. CRC Press, 2004. http://dx.doi.org/10.1201/9781420036336.ch18.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhen, and Jiang Yan. "Design of High-Speed Ethernet Data Loop Communication System Based on FPGA." In Advances in Transdisciplinary Engineering. IOS Press, 2025. https://doi.org/10.3233/atde250312.

Full text
Abstract:
To address the dual requirements of network protocol processing and high-speed data transmission, this paper proposes a network protocol stack solution based on a reconfigurable hardware platform. The architecture integrates pipeline processing technology with an adaptive rate matching mechanism, implementing cross-protocol (ARP/UDP/IP/ICMP) collaborative processing and three-speed Ethernet (10/100/1000Mbps) adaptive switching capability on FPGA hardware-programmable platforms, providing high-performance communication infrastructure for industrial IoT and edge computing scenarios. At the hardware architecture level, the system adopts a hierarchical protocol processing design. The underlying layer establishes a dual-port memory architecture and asynchronous data buffering unit, achieving multi-protocol parallel processing through dynamic priority arbitration mechanism. The middle layer integrates configurable rate matching modules, completing protocol parsing and encapsulation using a hardware description language (HDL)-developed protocol controller cluster (ARP/IP/UDP/ICMP). Considering chip ecosystem characteristics, a minimal IP dependency strategy is adopted, implementing core functional modules exclusively based on fundamental storage units (FIFO/RAM), significantly enhancing design portability. In functional verification, hardware simulation platforms confirm that the protocol stack possesses core capabilities including full-duplex UDP communication, active/passive address resolution, and network diagnostics (Ping). These technological breakthroughs not only resolve the contradiction between network protocol processing capability and transmission bandwidth in existing embedded devices, but also provide crucial technical support for establishing autonomous industrial communication systems.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Address resolution protocol spoofing"

1

VVS, Sriharsha, Viraj Kisan Daule, Surya R, and Thangam S. "Securing Networks: Advanced Detection and Prevention of Address Resolution Protocol Cache Spoofing Attack." In 2025 3rd International Conference on Integrated Circuits and Communication Systems (ICICACS). IEEE, 2025. https://doi.org/10.1109/icicacs65178.2025.10968452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Sendil Vadivu, and Narendran Rajagopalan. "Address Resolution Protocol Spoofing Mitigation in Software-Defined Networks using Ryu Controller's Centralized Flow Control." In 2025 3rd International Conference on Advancement in Computation & Computer Technologies (InCACCT). IEEE, 2025. https://doi.org/10.1109/incacct65424.2025.11011349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Amenu, Edwin Xorsenyo, and Sridaran Rajagopal. "Mitigating Address Resolution Protocol (ARP) Attack on Computer System." In 2024 International Conference on Intelligent & Innovative Practices in Engineering & Management (IIPEM). IEEE, 2024. https://doi.org/10.1109/iipem62726.2024.10925724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

A, Mohamed Yaqub, Sudikshan S, Navin Balaji E, Adarsh A, M. Gayathri, and Amlan Chakrabarti. "Quantum Key Distribution-Based Framework for Securing Encrypted Communications in Address Resolution Protocol Packet Capture." In 2024 IEEE 33rd Asian Test Symposium (ATS). IEEE, 2024. https://doi.org/10.1109/ats64447.2024.10915304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Yueqi, and Zhong Li. "Temporal-Spatial Attention Graph Neural Network for Detecting Address Resolution Protocol Attacks in Industrial Internet of Things." In 2024 4th International Conference on Artificial Intelligence, Robotics, and Communication (ICAIRC). IEEE, 2024. https://doi.org/10.1109/icairc64177.2024.10900045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duddu, Siromani, Arigela Rishita sai, Ch L. S. Sowjanya, G. Ramakoteswara Rao, and KarthikSainadh Siddabattula. "Secure Socket Layer Stripping Attack Using Address Resolution Protocol Spoofing." In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2020. http://dx.doi.org/10.1109/iciccs48265.2020.9120993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kleptsov, M. Y., and M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.

Full text
Abstract:
The ARP-spoofing (Address Resolution Protocol- spoofing) cyberattack nowadays poses a serious threat to the security of computer networks (CS). It is based on the abuse of the ARP protocol, which is responsible for matching IP addresses and physical MAC addresses in local networks. Using this type of attack, an attacker can intercept, redirect and even modify network traffic between devices, leading to serious negative consequences, such as reducing the confidentiality of transmitted data, introducing malware and spoofing network traffic. In the context of the constant development of information technology, the relevance and importance of this problem is increasing, especially for organizations and users of networks working in the logistics and transport. Transport has become a leader in the growth rate of fishing attacks. In this industry, by the end of 2023, the share of attacks of this type increased 2.4 times. This is the data of the BI.ZONE company. Based on the above, the main purpose of this article is, based on the analysis of methods of substitution and distortion of ARP records of the network infrastructure, to propose ways to protect against ARP spoofing, which are based on monitoring ARP records.
APA, Harvard, Vancouver, ISO, and other styles
8

Samvedi, Abhishek, Sparsh Owlak, and Vijay Kumar Chaurasia. "Improved Secure Address Resolution Protocol." In Fourth International Conference on Advances in Computing and Information Technology. Academy & Industry Research Collaboration Center (AIRCC), 2014. http://dx.doi.org/10.5121/csit.2014.4521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stepanov, Petr, Galina Nikonova, Tatyana Pavlychenko, and Anatoly Gil. "Attack on the Address Resolution Protocol." In 2020 International Conference Engineering and Telecommunication (En&T). IEEE, 2020. http://dx.doi.org/10.1109/ent50437.2020.9431297.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bakhache, Bassem, and Rabiha Rostom. "Kerberos secured Address Resolution Protocol (KARP)." In 2015 Fifth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). IEEE, 2015. http://dx.doi.org/10.1109/dictap.2015.7113201.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Address resolution protocol spoofing"

1

Bradley, T., and C. Brown. Inverse Address Resolution Protocol. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bradley, T., C. Brown, and A. Malis. Inverse Address Resolution Protocol. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Heinanen, J., and R. Govindan. NBMA Address Resolution Protocol (NARP). RFC Editor, 1994. http://dx.doi.org/10.17487/rfc1735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arkko, J., and C. Pignataro. IANA Allocation Guidelines for the Address Resolution Protocol (ARP). RFC Editor, 2009. http://dx.doi.org/10.17487/rfc5494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nachum, Y., L. Dunbar, I. Yerushalmi, and T. Mizrahi. The Scalable Address Resolution Protocol (SARP) for Large Data Centers. RFC Editor, 2015. http://dx.doi.org/10.17487/rfc7586.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shah, H., E. Rosen, G. Heron, and V. Kompella, eds. Address Resolution Protocol (ARP) Mediation for IP Interworking of Layer 2 VPNs. RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

DeSanti, C., C. Carlson, and R. Nixon. Transmission of IPv6, IPv4, and Address Resolution Protocol (ARP) Packets over Fibre Channel. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morse, P. D., R. J. H. Parker, S. L. Smith, and W. E. Sladen. Permafrost-related landforms and geotechnical data compilation, Yellowknife to Grays Bay corridor region, Slave Geological Province. Natural Resources Canada/CMSS/Information Management, 2023. http://dx.doi.org/10.4095/332017.

Full text
Abstract:
Permafrost conditions in the Slave Geological province are not well understood. Thaw of permafrost and associated ground ice can reduce ground stability, which modifies terrain and drainage patterns and affects terrestrial and aquatic ecosystems. This presents critical challenges to northern resource development and societies where thaw of ice-rich permafrost negatively affects the integrity of ground-based infrastructure. In an effort to address this knowledge gap, this report presents a digital georeferenced database of landforms identified in permafrost terrain using high-resolution satellite imagery and provides information on geomorphic indicators of ground ice presence and thaw susceptibility. Digital georeferenced databases compiled from sedimentological and cryostratigraphic records are also provided. The landform database is focused on mapping within a 10 km-wide swath of land (8576 km2 area of interest) centred on the proposed corridors for the 773 km-long Slave Geological Province Corridor Project, NT, and the Grays Bay Road and Port Project, NU. The geomorphic features were classified and digitized using high-resolution (0.5 m) satellite imagery following an existing protocol, which was modified by using a very high-resolution (2 m) digital elevation model (DEM), and by including mapping criteria for additional features. A total of 1393 geomorphic features were mapped comprising 10 different types, which were categorized into 3 classes that include periglacial (1291), hydrological (88), and mass movement (14) features. Data from 254 geotechnical boreholes and 2243 granular deposits were compiled. Information from the compiled databases was analyzed with surficial geology information. Results indicate that the distributions and densities of mapped landforms varied substantially according to surficial geology. High ground ice contents may be quite common in glaciofluvial deposits where creep of frozen ground affects about 30% of eskers. And ground ice may be more extensive overall than the available geotechnical data indicate. Borehole and granular deposit data suggest that overburden thickness above bedrock was up to 25.5 m, and visible ground ice contents were generally between 10% and 30%, but were up to 60% in glacial blanket and glaciofluvial sediments.
APA, Harvard, Vancouver, ISO, and other styles
9

Address Resolution Protocol (ARP) for the Identifier-Locator Network Protocol for IPv4 (ILNPv4). RFC Editor, 2012. http://dx.doi.org/10.17487/rfc6747.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!