IPv6 neighbor discovery protocol specifications, threats and countermeasures: a survey

ASAMS Ahmed, R Hassan, NE Othman - IEEE access, 2017 - ieeexplore.ieee.org
Neighbor discovery protocol (NDP) is the core protocol of Internet protocol version 6 (IPv6)
suite. The motive behind NDP is to replace address resolution protocol (ARP), router …

Bayes-based ARP attack detection algorithm for cloud centers

H Ma, H Ding, Y Yang, Z Mi, JY Yang… - Tsinghua science and …, 2016 - ieeexplore.ieee.org
To address the issue of internal network security, Software-Defined Network (SDN)
technology has been introduced to large-scale cloud centers because it not only improves …

Securing ARP and DHCP for mitigating link layer attacks

OS Younes - Sādhanā, 2017 - Springer
Network security has become a concern with the rapid growth and expansion of the Internet.
While there are several ways to provide security for communications at the application …

A procedure for collecting and labeling man-in-the-middle attack traffic

C Calvert, TM Khoshgoftaar… - International Journal of …, 2017 - World Scientific
In this work, we outline a procedure for collecting and labeling Man-in-the-Middle (MITM)
attack traffic. Our capture procedure allows for the collection of real-world representative …

ES-ARP: an efficient and secure address resolution protocol

M Ataullah, N Chauhan - 2012 IEEE Students' Conference on …, 2012 - ieeexplore.ieee.org
The Address Resolution Protocol (ARP) is used by computers to map logical addresses (IP)
to physical addresses (MAC). However ARP is an all trusting protocol and is stateless which …

[PDF][PDF] Security solution for ARP cache poisoning attacks in large data centre networks

B Prabadevi, N Jeyanthi - Cybernetics and Information Technologies, 2017 - sciendo.com
The bridge protocol (Address Resolution Protocol) ARP, integrating Ethernet (Layer 2) and
IP protocol (Layer 3) plays a vital role in TCP/IP communication since ARP packet is the first …

Effect of ARP poisoning attacks on modern operating systems

I Jana - Information Security Journal: A Global Perspective, 2017 - Taylor & Francis
Modern operating systems (OSs) are expected to be more secure as they integrate robust
security measures to ensure that users can perform their daily tasks reliably. In this article …

[PDF][PDF] A Secure Detection Framework for ARP, DHCP, and DoS Attacks on Kali Linux

M Dandotiya, AS Dandotiya, N Dandotiya… - Int J Res Appl Sci Eng …, 2022 - academia.edu
Currently, the Internet is playing a vital role in educating students to boost industrial
production. Various network components are employed to give a wide range of options and …

Microsoft windows vs. apple mac os x: Resilience against arp cache poisoning attack in a local area network

Z Trabelsi - Information Security Journal: A Global Perspective, 2016 - Taylor & Francis
Robust security measures are integrated into new release versions of operating systems
(OSs) to ensure that users have a more secure and reliable environment in which to run their …

[PDF][PDF] A new verification method to prevent security threads of unsolicited message in IP over ethernet networks

WK Alzubaidi, L Cai, SA Alyawer - International Journal of …, 2012 - researchgate.net
Internet is widely depends on the IP over Ethernet networks architecture. IP and Ethernet
protocols uses in each Local Area Network LAN, wire and wireless. Due to the rapid …