A survey of man in the middle attacks
The Man-In-The-Middle (MITM) attack is one of the most well known attacks in computer
security, representing one of the biggest concerns for security professionals. MITM targets …
security, representing one of the biggest concerns for security professionals. MITM targets …
D-arp: An efficient scheme to detect and prevent arp spoofing
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields
of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an …
of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an …
An active defense solution for ARP spoofing in OpenFlow network
J Xia, Z Cai, G Hu, M Xu - Chinese Journal of Electronics, 2019 - Wiley Online Library
As an emerging network technology, Software‐defined network (SDN), has been rapidly
developing for recent years due to its advantage in network management and updating …
developing for recent years due to its advantage in network management and updating …
Leveraging SDN for ARP security
Insider threats are a growing concern for industry, government, and campus networks. Yet,
vulnerabilities inherent in Address Resolution Protocol (ARP) are exploitable by insiders …
vulnerabilities inherent in Address Resolution Protocol (ARP) are exploitable by insiders …
DAPV: Diagnosing anomalies in MANETs routing with provenance and verification
Routing security plays an important role in the mobile ad hoc networks (MANETs). Despite
many attempts to improve its security, the routing mechanism of MANETs remains …
many attempts to improve its security, the routing mechanism of MANETs remains …
Bayes-based ARP attack detection algorithm for cloud centers
To address the issue of internal network security, Software-Defined Network (SDN)
technology has been introduced to large-scale cloud centers because it not only improves …
technology has been introduced to large-scale cloud centers because it not only improves …
DS‐ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Despite the convenience, ubiquitous computing suffers from many threats and security risks.
Security considerations in the ubiquitous network are required to create enriched and more …
Security considerations in the ubiquitous network are required to create enriched and more …
[图书][B] Cybercrime and Cybersecurity
PA Watters - 2023 - books.google.com
The field of cybersecurity and cybercrime is a critical and rapidly evolving area of study. As
our society becomes more and more reliant on technology, the risks of cybercrime increase …
our society becomes more and more reliant on technology, the risks of cybercrime increase …
[PDF][PDF] Cyber security analysis of DoS and MitM attacks against PLCs used in smart grids
It is obvious that the use of ICS will increase in view of the fact that smart grid systems are
rapidly spreading and the concept of smart cities will spread throughout the world in the …
rapidly spreading and the concept of smart cities will spread throughout the world in the …
ASD: ARP spoofing detector using openwrt
Y Jeong, H Kim, HJ Jo - Security and Communication Networks, 2022 - Wiley Online Library
The address resolution protocol (ARP) is one of the most important communication protocols
in a local area network (LAN). However, since there is no authentication procedure, the ARP …
in a local area network (LAN). However, since there is no authentication procedure, the ARP …