Page 21 - 2023-Vol19-Issue2
P. 21

17 |                                                                Nasser & Hussain

[17] G. A. Sukkar, R. Saifan, S. Khwaldeh, M. Maqableh,
      and I. Jafar, “Address resolution protocol (arp): Spoofing
      attack and proposed defense,” Commun. Netw., vol. 8,
      no. 3, pp. 118–130, 2016.

[18] M. Data, “The defense against arp spoofing attack using
      semi-static arp cache table,” 3rd International Confer-
      ence on Sustainable Information Engineering and Tech-
      nology, SIET 2018 - Proceedings, pp. 206–210, 2018.

[19] D. R. Rupal, D. Satasiya, H. Kumar, and A. Agrawal,
      “Detection and prevention of arp poisoning in dynamic
      ip configuration,” IEEE International Conference on
      Recent Trends in Electronics, Information and Commu-
      nication Technology (RTEICT), pp. 1240–1244, May
      2016.

[20] F. A. Barbhuiya, S. Biswas, and S. Nandi, “An active
      host-based intrusion detection system for arp-related
      attacks and its verification,” International Journal of
      Network Security and Its Applications, vol. 3, no. 3,
      pp. 163–180, 2011.

[21] G. Jinhua and X. Kejian, “Arp spoofing detection algo-
      rithm using icmp protocol,” in 2013 International Con-
      ference on Computer Communication and Informatics,
      vol. 3, no. 5, pp. 1–6, Jan. 2013.

[22] J. C. Lin, M. J. Koo, and C. S. Wang, “A proposal for a
      schema for arp spoofing protection,” Appl. Mech. Mater.,
      vol. 284–287, no. 5, pp. 3275–3279, Jan. 2013.

[23] V. Ramachandran and S. Nandi, “Detecting arp spoofing:
      An active technique,” Lect. Notes Comput. Sci. (includ-
      ing Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinfor-
      matics), vol. 3803, no. 5, pp. 239–250, 2005.

[24] A. Samvedi, S. Owlak, and V. K. Chaurasia, “Improved
      secure address resolution protocol,” pp. 201–211, June
      2014.

[25] I. Martinovic, F. A. Zdarsky, A. Bachorek, C. Jung, and
      J. B. Schmitt, “Phishing in the wireless: Implementation
      and analysis,” pp. 145–156, 2007.

[26] A. M. AbdelSalam, W. S. Elkilani, and K. M. Amin,
      “An automated approach for preventing arp spoofing at-
      tack using static arp entries,” International Journal of
      Advanced Computer Science and Applications, vol. 5,
      no. 1, 2014.

[27] Z. Trabelsi and K. Shuaib, “Spoofed arp packets detec-
      tion in switched lan networks,” SECRYPT 2006 - Int.
      Conf. Secur. Cryptogr. Proc., pp. 40–47, 2006.
   16   17   18   19   20   21   22   23   24   25   26