To see the other types of publications on this topic, follow the link: Address resolution protocol spoofing.

Journal articles on the topic 'Address resolution protocol spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Address resolution protocol spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication proces
APA, Harvard, Vancouver, ISO, and other styles
2

Ashok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.

Full text
Abstract:
<em>Due to its stateless nature and absence of authentication mechanisms to verify sender identity, the Address Resolution Protocol (ARP) has long been susceptible to spoofing attacks. ARP spoofing often serves as a gateway to more advanced attacks on local area networks, such as denial of service, man-in-the-middle, and session hijacking. Most existing detection methods adopt a passive approach by monitoring ARP traffic for anomalies in the IP-to-Ethernet address mappings. However, this strategy suffers from a delayed response time, often identifying an attack only after it has already caused
APA, Harvard, Vancouver, ISO, and other styles
3

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.

Full text
Abstract:
The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain a
APA, Harvard, Vancouver, ISO, and other styles
4

Herman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.

Full text
Abstract:
The rapid development of wireless technology has made network communication more accessible but also increasingly vulnerable to security threats. One of the major threats is the Man-in-the-Middle (MitM) Attack, particularly ARP Spoofing, which manipulates the Address Resolution Protocol (ARP) to intercept or alter network traffic. ARP Spoofing, also known as ARP Poisoning, allows attackers to associate incorrect MAC addresses with IP addresses, enabling unauthorized access and potential data interception. This research focuses on the detection and investigation of ARP Spoofing on MikroTik rout
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, Jui-Pin. "Web-Based Enterprise Management-Address Resolution Protocol: An Efficient Scheme for Preventing Address Resolution Protocol Spoofing." Advanced Science, Engineering and Medicine 7, no. 11 (2015): 1003–6. http://dx.doi.org/10.1166/asem.2015.1796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al Sukkar, Ghazi, Ramzi Saifan, Sufian Khwaldeh, Mahmoud Maqableh, and Iyad Jafar. "Address Resolution Protocol (ARP): Spoofing Attack and Proposed Defense." Communications and Network 08, no. 03 (2016): 118–30. http://dx.doi.org/10.4236/cn.2016.83012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mohammad Daud. "Detection of ARP Spoofing Attack by using ETTERCAP." Advances in Nonlinear Variational Inequalities 28, no. 4s (2025): 560–71. https://doi.org/10.52783/anvi.v28.3512.

Full text
Abstract:
In our day-to-day life, we share or communicate over the internet in so many ways but to share or communicate we use some set of protocols so that we can send the information. ARP (Address Resolution Protocol) is one of them to communicate over the internet, but there are some chances of being spoofed by using the Address Resolution Protocol as attackers can steal your sensitive information through a Man-In-the-Middle attack. In this attack, a third person can be impersonated or spoofed the IP and we call it an IP spoofing attack. Therefore, to detect this attack we have used the Ettercap tool
APA, Harvard, Vancouver, ISO, and other styles
8

Mehta, Suma B., and A. Rengarajan. "A Survey on ARP Poisoning." International Journal of Innovative Research in Computer and Communication Engineering 12, no. 02 (2024): 1031–37. http://dx.doi.org/10.15680/ijircce.2024.1202051.

Full text
Abstract:
This paper's primary goal is to examine the detection and mechanism of ARP spoofing. One may argue that the Address Resolution Protocol, or ARP for simple terms, is crucial to computer science and forensics. ARP spoofing is one of the various computers hacking techniques used nowadays by individuals to transmit phony ARP packets across a Local Area Network (LAN). Such attacks might lead to changes in traffic patterns or, worse yet, a temporary or permanent stoppage of traffic. Even though this attack is only possible on networks with Address Resolution Protocols, ARP spoofing can be a precurso
APA, Harvard, Vancouver, ISO, and other styles
9

Nasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.

Full text
Abstract:
Address Resolution Protocol (ARP) is used to resolve a host’s MAC address, given its IP address. ARP is stateless, as there is no authentication when exchanging a MAC address between the hosts. Hacking tactics using ARP spoofing are constantly being abused differently; many previous studies have prevented such attacks. However, prevention requires modification of the underlying network protocol or additional expensive equipment, so applying these methods to the existing network can be challenging. In this paper, we examine the limitations of previous research in preventing ARP spoofing. In add
APA, Harvard, Vancouver, ISO, and other styles
10

Hafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.

Full text
Abstract:
Pada jaringan komputer, protokol yang bertugas untuk untuk menerjemahkan IP address menjadi MAC Address adalah Address Resolution Protocol (ARP). Sifat stateless pada protokol ARP, menyebabkan protokol ARP memiliki celah dari segi keamanan. Celah ini dapat menimbulkan serangan terhadap ARP Protocol, disebabkan karena ARP request yang dikirimkan secara broadcast, sehingga semua host yang berada pada satu broadcast domain dapat merespon pesan ARP tersebut walaupun pesan tersebut bukan ditujukan untuknya. Serangan inilah yang biasa disebut dengan ARP Spoofing. Serangan ini dapat berimbas pada ser
APA, Harvard, Vancouver, ISO, and other styles
11

Jeong, Yeonseon, Hyunghoon Kim, and Hyo Jin Jo. "ASD: ARP Spoofing Detector Using OpenWrt." Security and Communication Networks 2022 (March 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2196998.

Full text
Abstract:
The address resolution protocol (ARP) is one of the most important communication protocols in a local area network (LAN). However, since there is no authentication procedure, the ARP is vulnerable to cyberattack such as ARP spoofing. Since ARP spoofing can be connected to critical attacks, including a man-in-the-middle (MITM) attack, detecting ARP spoofing initially without returning false-positive alarms is important. In general, however, existing works for ARP spoofing are unable to distinguish between ARP spoofing and connections from virtual machine (VM) guests, which results in false-posi
APA, Harvard, Vancouver, ISO, and other styles
12

Wijayanto, Agus, Imam Riadi, Yudi Prayudi, and Tri Sudinugraha. "Network Forensics Against Address Resolution Protocol Spoofing Attacks Using Trigger, Acquire, Analysis, Report, Action Method." Register: Jurnal Ilmiah Teknologi Sistem Informasi 8, no. 2 (2023): 156–69. http://dx.doi.org/10.26594/register.v8i2.2953.

Full text
Abstract:
This study aims to obtain attack evidence and reconstruct commonly used address resolution protocol attacks as a first step to launch a moderately malicious attack. MiTM and DoS are the initiations of ARP spoofing attacks that are used as a follow-up attack from ARP spoofing. The impact is quite severe, ranging from data theft and denial of service to crippling network infrastructure systems. In this study, data collection was conducted by launching an test attack against a real network infrastructure involving 27 computers, one router, and four switches. This study uses a Mikrotik router by b
APA, Harvard, Vancouver, ISO, and other styles
13

Lu, Yiqin, Meng Wang, and Pengsen Huang. "An SDN-Based Authentication Mechanism for Securing Neighbor Discovery Protocol in IPv6." Security and Communication Networks 2017 (2017): 1–9. http://dx.doi.org/10.1155/2017/5838657.

Full text
Abstract:
The Neighbor Discovery Protocol (NDP) is one of the main protocols in the Internet Protocol version 6 (IPv6) suite, and it provides many basic functions for the normal operation of IPv6 in a local area network (LAN), such as address autoconfiguration and address resolution. However, it has many vulnerabilities that can be used by malicious nodes to launch attacks, because the NDP messages are easily spoofed without protection. Surrounding this problem, many solutions have been proposed for securing NDP, but these solutions either proposed new protocols that need to be supported by all nodes or
APA, Harvard, Vancouver, ISO, and other styles
14

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Full text
Abstract:
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important inf
APA, Harvard, Vancouver, ISO, and other styles
15

Yang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing." Applied Mechanics and Materials 484-485 (January 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.

Full text
Abstract:
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol ARP virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the ARP Find virus source and virus removal methods, and finally putting forward effective measures to guard against ARP virus.
APA, Harvard, Vancouver, ISO, and other styles
16

Jamil, Harun, Abid Ali, and Faisal Jamil. "Spoofing Attack Mitigation in Address Resolution Protocol (ARP) and DDoS in Software-Defined Networking." Journal of Information Security and Cybercrimes Research 5, no. 1 (2022): 31–42. http://dx.doi.org/10.26735/vbvs3993.

Full text
Abstract:
Software Defined Networking (SDN) shows network operations to be performed for efficient network operations. Due to the increase in network devices, the percentage of attacks is also increased, and it is challenging to provide defense against such attacks. In SDN, the control plan is separated from the data plane. The control plan is implemented using some central devices called SDN controllers. In SDN Address Resolution Protocol (ARP), spoofing and Distributed Denial of Services (DDoS) attacks are carried out on an enormous scale. These are commonly launched attacks in SDN. Due to these attac
APA, Harvard, Vancouver, ISO, and other styles
17

Riadi, Imam, Abdul Fadlil, and Muhammad Nasir Hafizh. "Analisis Bukti Serangan Address Resolution Protocol Spoofing menggunakan Metode National Institute of Standard Technology." Edumatic : Jurnal Pendidikan Informatika 4, no. 1 (2020): 21–29. http://dx.doi.org/10.29408/edumatic.v4i1.2046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Chai, Tze Uei, Hock Guan Goh, Soung-Yue Liew, and Vasaki Ponnusamy. "Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory." Systems 11, no. 4 (2023): 211. http://dx.doi.org/10.3390/systems11040211.

Full text
Abstract:
Industry Revolution 4.0 connects the Internet of Things (IoT) resource-constrained devices to Smart Factory solutions and delivers insights. As a result, a complex and dynamic network with a vulnerability inherited from the Internet becomes an attractive target for hackers to attack critical infrastructures. Therefore, this paper selects three potential attacks with the evaluation of the protections, namely (1) distributed denial of service (DDoS), (2) address resolution protocol (ARP) spoofing, and (3) Internet protocol (IP) fragmentation attacks. In the DDoS protection, the F1-score, accurac
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Qijun, and Yipeng Dong. "Advanced approaches to prevent ARP attacks." Applied and Computational Engineering 44, no. 1 (2024): 124–37. http://dx.doi.org/10.54254/2755-2721/44/20230410.

Full text
Abstract:
Nowadays, there exist various types of Address Resolution Protocol(ARP)-based attacks, such as ARP flood attacks, ARP spoofing host attacks, attacks that spoof gateways, man-in-the-middle attacks and Internet Protocol(IP) address collision attacks. Focusing on the prevention to ARP spoofing, this paper first introduces S-ARP, a secure version of ARP utilizing asymmetric cryptography and focusing on message authentication rather than traffic confidentiality that aims to mitigate such attacks. It then talks about a modular approach based on multiple modules utilizing databases instead of focusin
APA, Harvard, Vancouver, ISO, and other styles
20

Shah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.

Full text
Abstract:
Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its stateless nature and lack of authentication. One such spoofing attack is the ARP Cache Poisoning attack, in which attackers poison the cache of hosts on the network by sending spoofed ARP requests and replies. Detection and mitigation of ARP Cache Poisoning attack is important as this attack can be used by attackers to further launch Denial of Servic
APA, Harvard, Vancouver, ISO, and other styles
21

Dao, Quy-Thinh, Le-Trung Nguyen, Trung-Kien Ha, Viet-Hoang Nguyen, and Tuan-Anh Nguyen. "Investigation of Secure Communication of Modbus TCP/IP Protocol: Siemens S7 PLC Series Case Study." Applied System Innovation 8, no. 3 (2025): 65. https://doi.org/10.3390/asi8030065.

Full text
Abstract:
Industrial Control Systems (ICS) have become increasingly vulnerable to cyber threats due to the growing interconnectivity with enterprise networks and the Industrial Internet of Things (IIoT). Among these threats, Address Resolution Protocol (ARP) spoofing presents a critical risk to the integrity and reliability of Modbus TCP/IP communications, particularly in environments utilizing Siemens S7 programmable logic controllers (PLCs). Traditional defense methods often rely on host-based software solutions or cryptographic techniques that may not be practical for legacy or resource-constrained i
APA, Harvard, Vancouver, ISO, and other styles
22

Putra, Fauzan Prasetyo Eka, Ubaidi Ubaidi, Alief Badrit Tamam, and Reynal Widya Efendi. "Implementation And Simulation Of Dynamic Arp Inspection In Cisco Packet Tracer For Network Security." Brilliance: Research of Artificial Intelligence 4, no. 1 (2024): 340–47. http://dx.doi.org/10.47709/brilliance.v4i1.4199.

Full text
Abstract:
Dynamic ARP Inspection (DAI) is a security feature that helps prevent Address Resolution Protocol (ARP) spoofing attacks, which can compromise the integrity and confidentiality of data in a network. This paper presents the implementation and simulation of DAI using Cisco Packet Tracer, a network simulation tool. The goal is to show how DAI can be configured and used to improve network security by verifying ARP packets in a switched network. The implementation involved setting up a network topology with switches and end devices, configuring DHCP snooping, and enabling DAI on the switches. Simul
APA, Harvard, Vancouver, ISO, and other styles
23

Tissir, Najat, Noureddine Aboutabit, and Said El Kafhali. "Detection and prevention of Man-in-The-Middle attack in cloud computing using Openstack." Bulletin of Electrical Engineering and Informatics 14, no. 1 (2025): 377–87. http://dx.doi.org/10.11591/eei.v14i1.8103.

Full text
Abstract:
This paper proposes a new technique designed to prevent and detect address resolution protocol (ARP) spoofing attacks in general, and specifically Man-in-the-Middle (MitM) attacks, within the context of cloud computing. The solution focuses on establishing appropriate flow filtering rules based on parameters such as 'time feature' and internet control message protocol '(ICMP) protocol'. The tests were conducted using the Openstack platform. One of the key benefits of this proposed approach is the improved performance in effectively detecting a significant number of malicious packets. We implem
APA, Harvard, Vancouver, ISO, and other styles
24

Dr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Ladde Akash, Jadhav Rohan, and Dani Rajrajeshwari. "A Decentralized Security Strategy to Counter ARP Cache Poisoning Attacks." Advancement and Research in Instrumentation Engineering 8, no. 2 (2025): 6–12. https://doi.org/10.5281/zenodo.15542613.

Full text
Abstract:
<em>The Address Resolution Protocol (ARP) plays a vital role in the Internet protocol suite, but it lacks built-in security features, particularly in verifying the legitimacy of ARP replies. This vulnerability allows attackers to inject fake ARP messages into a Local Area Network (LAN), thereby corrupting the ARP cache of targeted devices. Successful ARP spoofing can enable attackers to carry out man-in-the-middle (MITM) attacks intercepting or altering data or even launch denial-of-service (DoS) attacks. Therefore, identifying and preventing ARP cache poisoning is essential. While several stu
APA, Harvard, Vancouver, ISO, and other styles
25

Gattu, Hanudeep, Joshnitha Karimireddy, and Kanishka G. "DNS Under Siege: Ethical DNS Spoofing and Countermeasures." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 250–54. https://doi.org/10.47001/irjiet/2025.inspire40.

Full text
Abstract:
The Domain Name System (DNS) is a crucial part of the internet, responsible for converting humanreadable domain names into numerical IP addresses that computers use to communicate. However, DNS is vulnerable to spoofing attacks, where attackers manipulate DNS responses to redirect users to fake websites. These attacks can lead to data theft, phishing, malware infections, and unauthorized access to sensitive information. Despite existing security measures, DNS spoofing remains a serious cybersecurity threat due to weaknesses in the traditional DNS protocol. The implementation of this framework
APA, Harvard, Vancouver, ISO, and other styles
26

Buzura, Sorin, Mihaiela Lehene, Bogdan Iancu, and Vasile Dadarlat. "An Extendable Software Architecture for Mitigating ARP Spoofing-Based Attacks in SDN Data Plane Layer." Electronics 11, no. 13 (2022): 1965. http://dx.doi.org/10.3390/electronics11131965.

Full text
Abstract:
Software-defined networking (SDN) is an emerging network architecture that brings benefits in network function virtualization, performance, and scalability. However, the scalability feature also increases the number of possible vulnerabilities through multiple entry points in the network. Address Resolution Protocol (ARP) spoofing-based attacks are widely encountered and allow an attacker to assume the identity of a different computer, facilitating other attacks, such as Man in the Middle (MitM). In the SDN context, most solutions employ a controller to detect and mitigate attacks. However, in
APA, Harvard, Vancouver, ISO, and other styles
27

Islam, Md Zahirul, Syed Md Galib, and Md Humaun Kabir. "Automation of 5G network slicing security using intent-based networking." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 401. http://dx.doi.org/10.11591/ijece.v15i1.pp401-413.

Full text
Abstract:
Network slicing is a fundamental technological advancement that facilitates the provision of novel services and solutions within the realm of 5G and the forthcoming 6G communications. Numerous challenges emerge when implementing network slicing on a large-scale commercial level since it necessitates comprehensive control and automation of the entire network. Cyberattacks, such as distributed denial of service (DDoS) and address resolution protocol (ARP) spoofing, can significantly disrupt the performance and accessibility of slices inside a multi-tenant virtualized networking infrastructure du
APA, Harvard, Vancouver, ISO, and other styles
28

Islam, Md. Zahirul, Syed Md. Galib, and Md. Humaun Kabir. "Automation of 5G network slicing security using intent-based networking." International Journal of Electrical and Computer Engineering (IJECE) 15, no. 1 (2025): 401–13. https://doi.org/10.11591/ijece.v15i1.pp401-413.

Full text
Abstract:
Network slicing is a fundamental technological advancement that facilitatesthe provision of novel services and solutions within the realm of 5G and theforthcoming 6G communications. Numerous challenges emerge whenimplementing network slicing on a large-scale commercial level since itnecessitates comprehensive control and automation of the entire network.Cyberattacks, such as distributed denial of service (DDoS) and addressresolution protocol (ARP) spoofing, can significantly disrupt theperformance and accessibility of slices inside a multi-tenant virtualizednetworking infrastructure due to the
APA, Harvard, Vancouver, ISO, and other styles
29

Dr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Rishikesh, Pratiksha, and Hinn Benny. "Mitigating ARP Poisoning Via Modified ICMP and Voting Mechanism." Journal of Research in Electrical Power System 1, no. 2 (2025): 8–16. https://doi.org/10.5281/zenodo.15573683.

Full text
Abstract:
<em>Address Resolution Protocol (ARP) poisoning is a key vulnerability exploited in advanced LAN attacks, such as Denial- of-Service (DoS) and Man-in-the-Middle (MITM) attacks. The stateless nature of ARP weakens network security, especially in Ethernet environments. To detect such threats, the proposed method involves monitoring network traffic through a Central Server (CS), which then sends a trap ICMP ping packet and analyzes the response to identify malicious activity. For prevention, a voting-based mechanism is used to select a trustworthy CS. By validating and correcting &lt;IP, MAC&gt;
APA, Harvard, Vancouver, ISO, and other styles
30

Usman, Muhammad, Rashid Amin, Hamza Aldabbas, and Bader Alouffi. "Lightweight Challenge-Response Authentication in SDN-Based UAVs Using Elliptic Curve Cryptography." Electronics 11, no. 7 (2022): 1026. http://dx.doi.org/10.3390/electronics11071026.

Full text
Abstract:
Unmanned aerial vehicles (UAVs) (also known as drones) are aircraft that do not require the presence of a human pilot to fly. UAVs can be controlled remotely by a human operator or autonomously by onboard computer systems. UAVs have many military uses, including battlefield surveillance, effective target tracking and engagement in air-to-ground warfare, and situational awareness in challenging circumstances. They also offer a distinct advantage in various applications such as forest fire monitoring and surveillance. Surveillance systems are developed using advanced technologies in the modern e
APA, Harvard, Vancouver, ISO, and other styles
31

Raghu, Ram Chowdary Velevela. "A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks." Journal of Research and Review: Future Internet and Hyperconnectivity 1, no. 1 (2025): 31–39. https://doi.org/10.5281/zenodo.15111880.

Full text
Abstract:
<em>IP address spoofing, commonly referred to as IP spoofing, involves generating Internet Protocol (IP) packets with a falsified source IP address to obscure the sender&rsquo;s identity or mimic another system. Just as criminals have historically used disguises, aliases, or caller ID blocking to mask their identities, cybercriminals adopt similar tactics in digital environments. IP spoofing serves as a widely used method of online deception, enabling attackers to gain unauthorized access to networks or systems by forging an IP address to make malicious communications appear as though they ori
APA, Harvard, Vancouver, ISO, and other styles
32

Veeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Full text
Abstract:
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprieta
APA, Harvard, Vancouver, ISO, and other styles
33

Marzuki, Khairan, Naufal Hanif, and I. Putu Hariyadi. "Application of Domain Keys Identified Mail, Sender Policy Framework, Anti-Spam, and Anti-Virus: The Analysis on Mail Servers." International Journal of Electronics and Communications Systems 2, no. 2 (2022): 65–73. http://dx.doi.org/10.24042/ijecs.v2i2.13543.

Full text
Abstract:
Viruses spread through email are often sent by irresponsible parties that aim to infect email users' servers. This background encouraged the author to analyze the application of DKIM, SPF, anti-spam, and anti-virus to avoid spam, viruses, and spoofing activities. The goal is for the server to prevent spam, spoofing, and viruses to ensure the security and convenience of email users and prevent the impact of losses caused by them. The design and analysis of DKIM, SPF, anti-spam, and anti-virus applications use the NDLC methodology. The process includes designing spam, spoofing, and virus filteri
APA, Harvard, Vancouver, ISO, and other styles
34

Tai, J. L., Nor Adnan Yahaya, and K. Daniel Wong. "Address Resolution Protocol Optimization." Jurnal Kejuruteraan 21, no. 1 (2009): 11–20. http://dx.doi.org/10.17576/jkukm-2009-21-02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

N., D. Patel, Mehtre B.M., Wankar R., and Priyadarshi R. "Development of a Novel Methods for Detecting & Preventing the Spoofed attack Packets." International Journal of Microsystems and IoT 1, no. 2 (2023): 99–112. https://doi.org/10.5281/zenodo.8289269.

Full text
Abstract:
IP-Spoofing is an attack that forges the source &ldquo;IP- Address&rdquo; to mislead the receiver about the sender, making it difficult to trace back. Existing IP-Spoofing prevention methods like Ingress/Egress filtering, and Reverse Path Forwarding have the following limitations: they filter only the IP Packets of the local network, limited logging capabilities, and work only for specific types of TCP/IP protocol attacks. This paper introduces BGP- ASE, an effective method called Border Gateway Protocol Anti-Spoofing Extension, designed to combat IP spoofing by successfully intercepting and p
APA, Harvard, Vancouver, ISO, and other styles
36

Sari, Linna Oktaviana, Ery Safrianti, and Defvi Wahyuningtias. "Analisis Keamanan Jaringan Berbasis Point to Point Protocol Over Ethernet (PPPoE) Menggunakan Mikrotik." MALCOM: Indonesian Journal of Machine Learning and Computer Science 4, no. 3 (2024): 943–54. http://dx.doi.org/10.57152/malcom.v4i3.1301.

Full text
Abstract:
Keamanan jaringan adalah proses tindakan untuk melindungi jaringan untuk menghindari berbagai jenis serangan dan pelanggaran data, seperti mencegah serangan cyber, kontrol akses, mendeteksi perangkat lunak berbahaya dan tindakan keamanan lainnya. Jaringan LAN memiliki protokol yang disebut Address Resolusi Protocol (ARP). ARP merupakan protokol yang sangat mudah untuk dieksploitasi karena paket transaksi ARP dapat dimanipulasi oleh komputer manapun. Serangan ARP spoofing dapat dieksploitasi pada kerentanan ini. Untuk mengamankan jaringan lokal dari serangan ARP Spoofing, diperlukan mekanisme k
APA, Harvard, Vancouver, ISO, and other styles
37

Gouda, Mohamed G., and Chin-Tser Huang. "A secure address resolution protocol." Computer Networks 41, no. 1 (2003): 57–71. http://dx.doi.org/10.1016/s1389-1286(02)00326-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Narendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.

Full text
Abstract:
The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current i
APA, Harvard, Vancouver, ISO, and other styles
39

Lone, Imtiyaz Ahmad, Jahangeer Ali, and Kalimullah Lone. "IDARP: ID-based Address Resolution Protocol." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 4, no. 2 (2013): 277–83. http://dx.doi.org/10.24297/ijct.v4i2a2.3171.

Full text
Abstract:
In this paper, security attacks in ARP are classified and logically organized/represented in a more lucid manner.ARP provides no authentication mechanism to the incoming request packets this is the reason that any client can forge an ARP message contains malicious information to poison the ARP cache of target host. There are many possible attacks on ARP which can make the communication unsecure such as man-in-the-middle (MITM), Denial of service (DOS) and cloning attack.
APA, Harvard, Vancouver, ISO, and other styles
40

Lootah, Wesam, William Enck, and Patrick McDaniel. "TARP: Ticket-based address resolution protocol." Computer Networks 51, no. 15 (2007): 4322–37. http://dx.doi.org/10.1016/j.comnet.2007.05.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Puhl, Zachary T., and Jinhua Guo. "Securing IPv6 Neighbor Discovery Address Resolution with Voucher-Based Addressing." Network 4, no. 3 (2024): 338–66. http://dx.doi.org/10.3390/network4030016.

Full text
Abstract:
The majority of local IPv6 networks continue to remain insecure and vulnerable to neighbor spoofing attacks. The Secure Neighbor Discovery (SEND) standard and its concomitant Cryptographically Generated Addressing (CGA) scheme were accepted by large standard bodies to codify practical mitigations. SEND and CGA have never seen widespread adoption due to their complexities, obscurity, costs, compatibility issues, and continued lack of mature implementations. In light of their poor adoption, research since their standardization has continued to find new perspectives and proffer new ideas. The ort
APA, Harvard, Vancouver, ISO, and other styles
42

Rahim, Muheez A., Bilkisu Jimada-Ojuolape, Monsurat O. Balogun, and Lambe M. Adesina. "Security analysis in wireless networks." Caliphate Journal of Science and Technology 7, no. 1 (2025): 1–11. https://doi.org/10.4314/cajost.v7i1.01.

Full text
Abstract:
Wireless networks have become essential to our daily lives, providing connectivity for a wide range of devices. However, with the increasing use of wireless networks, security has become a major concern. Media Access Control (MAC) address flooding, Dynamic Host Configuration Protocol (DHCP) spoofing, and rogue Secure Shell (SSH) are some of the most common security threats in wireless networks. These attacks can cause loss of confidentiality, integrity, and availability of network resources. In this study, vulnerabilities and challenges related to MAC address flooding, DHCP spoofing, and rogue
APA, Harvard, Vancouver, ISO, and other styles
43

Stepanov, P. P., G. V. Nikonova, T. S. Pavlychenko, and A. S. Gil. "The problem of security address resolution protocol." Journal of Physics: Conference Series 1791, no. 1 (2021): 012061. http://dx.doi.org/10.1088/1742-6596/1791/1/012061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Harjono, Harjono. "Address Resolution Protocol Functions in The Ethernet." JUITA : Jurnal Informatika 5, no. 2 (2018): 59. http://dx.doi.org/10.30595/juita.v5i2.2026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Li, Zhong, and Huimin Zhuang. "A multi-factor integration-based semi-supervised learning for address resolution protocol attack detection in SDIIoT." International Journal of Distributed Sensor Networks 17, no. 12 (2021): 155014772110599. http://dx.doi.org/10.1177/15501477211059940.

Full text
Abstract:
Nowadays, in the industrial Internet of things, address resolution protocol attacks are still rampant. Recently, the idea of applying the software-defined networking paradigm to industrial Internet of things is proposed by many scholars since this paradigm has the advantages of flexible deployment of intelligent algorithms and global coordination capabilities. These advantages prompt us to propose a multi-factor integration-based semi-supervised learning address resolution protocol detection method deployed in software-defined networking, called MIS, to specially solve the problems of limited
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Geng, Wuyuan Xie, Di Lin, Ye Liu, and Miaohui Wang. "mmFAS: Multimodal Face Anti-Spoofing Using Multi-Level Alignment and Switch-Attention Fusion." Proceedings of the AAAI Conference on Artificial Intelligence 39, no. 1 (2025): 58–66. https://doi.org/10.1609/aaai.v39i1.31980.

Full text
Abstract:
The increasing number of presentation attacks on reliable face matching has raised concerns and garnered attention towards face anti-spoofing (FAS). However, existing methods for FAS modeling commonly fuse multiple visual modalities (e.g., RGB, Depth, and Infrared) in a straightforward manner, disregarding latent feature gaps that can hinder representation learning. To address this challenge, we propose a novel multimodal FAS framework (mmFAS) that focuses on explicit alignment and fusion of latent features across different modalities. Specifically, we develop a multimodal alignment module to
APA, Harvard, Vancouver, ISO, and other styles
47

Lema, Hussein, Fatuma Simba, and Joseph Mushi. "Security Enhancement of SIP Protocol in VoIP Communication." Journal of ICT Systems 1, no. 2 (2023): 71–92. http://dx.doi.org/10.56279/jicts.v1i2.32.

Full text
Abstract:
In Voice over IP (VoIP) systems, calls are started, maintained, and ended using the Session Initiation Protocol (SIP). One of the SIP flaws is the lack of enough data to validate users, and its contents can be changed to fake the Caller Identification (CID). Fake CID can be used by hackers to trick receivers and obtain valuable materials. Existing solutions have a number of faults, including the use of more network resources, the use of insufficient data to identify fake CID, and high call setup delay for caller and callee during the validation process. This work presents an algorithm to enhan
APA, Harvard, Vancouver, ISO, and other styles
48

Wu, Jian Dong, and Guo Hui Huang. "ARP Fraudulence and Strategy in Local Area Network." Applied Mechanics and Materials 433-435 (October 2013): 1681–84. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1681.

Full text
Abstract:
This article has analyzed the local area network Address Resolution Protocol principle of work and the safe hidden danger, proposed the Address Resolution Protocol deceit's design realizes the method, and has analyzed its harm through the example, finally has made the further discussion to the procedure extendibility and the effective protection method.
APA, Harvard, Vancouver, ISO, and other styles
49

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.

Full text
Abstract:
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent
APA, Harvard, Vancouver, ISO, and other styles
50

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering and Technology Research 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejeng.2019.4.12.1644.

Full text
Abstract:
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!