A survey on consensus protocols and attacks on blockchain technology
In the current era, blockchain has approximately 30 consensus algorithms. This
architecturally distributed database stores data in an encrypted form with multiple checks …
architecturally distributed database stores data in an encrypted form with multiple checks …
Denial-of-service attack on IEC 61850-based substation automation system: A crucial cyber threat towards smart substation pathways
The generation of the mix-based expansion of modern power grids has urged the utilization
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …
of digital infrastructures. The introduction of Substation Automation Systems (SAS) …
Address resolution protocol spoofing attacks and security approaches: A survey
S Hijazi, MS Obaidat - Security and Privacy, 2019 - Wiley Online Library
Address resolution protocol (ARP) is a very popular communication protocol in the local
area network (LAN), working under the network layer, as per the open systems …
area network (LAN), working under the network layer, as per the open systems …
A new detection and prevention system for ARP attacks using static entry
S Hijazi, MS Obaidat - IEEE Systems Journal, 2018 - ieeexplore.ieee.org
This paper investigates the vulnerabilities of address resolution protocol (ARP), which is one
of the key protocols in the TCP/IP suite, and used to associate the Internet protocol address …
of the key protocols in the TCP/IP suite, and used to associate the Internet protocol address …
Provably curb man-in-the-middle attack-based ARP spoofing in a local network
HI Nasser, MA Hussain - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
Even today, internet users' data security remains a significant concern. One problem is ARP
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …
poisoning, otherwise referred to as ARP spoofing. Such attacks are intended to exploit the …
Deep Insight into IoT‐Enabled Agriculture and Network Protocols
In recent years, research has combined the connection of agricultural equipment to increase
crop growth rates and lower planting costs by refining the entire planting process. IT …
crop growth rates and lower planting costs by refining the entire planting process. IT …
[PDF][PDF] Detecting end-point (EP) man-in-the-middle (MITM) attack based on ARP analysis: A machine learning approach
JJ Kponyo, JO Agyemang… - International Journal of …, 2020 - pdfs.semanticscholar.org
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security.
This attack targets the flow of information between endpoints. An attacker is able to …
This attack targets the flow of information between endpoints. An attacker is able to …
Man-in-the-middle-attack and proposed algorithm for detection
A Nigam, S Sharma, RK Patel… - … International Mobile and …, 2022 - ieeexplore.ieee.org
Today, when every-day processes are going online, the risk of cyber-attacks are increasing
at an exponential rate. As everything is going online, we see an increase in the availability of …
at an exponential rate. As everything is going online, we see an increase in the availability of …
[PDF][PDF] An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN.
HI Nasser, MA Hussain - Iraqi Journal for Electrical & Electronic Engineering, 2023 - iasj.net
Abstract Address Resolution Protocol (ARP) is used to resolve a host's MAC address, given
its IP address. ARP is stateless, as there is no authentication when exchanging a MAC …
its IP address. ARP is stateless, as there is no authentication when exchanging a MAC …
Combating ARP Spoofing: Detection and Analysis Techniques
D Patel, D Shah - 2024 11th International Conference on …, 2024 - ieeexplore.ieee.org
Address Resolution Protocol (ARP) spoofing creates a security threat by exploiting
weaknesses in how devices in a network link IP address to physical addresses. In a …
weaknesses in how devices in a network link IP address to physical addresses. In a …