Page 21 - 2023-Vol19-Issue2
P. 21
17 | Nasser & Hussain
[17] G. A. Sukkar, R. Saifan, S. Khwaldeh, M. Maqableh,
and I. Jafar, “Address resolution protocol (arp): Spoofing
attack and proposed defense,” Commun. Netw., vol. 8,
no. 3, pp. 118–130, 2016.
[18] M. Data, “The defense against arp spoofing attack using
semi-static arp cache table,” 3rd International Confer-
ence on Sustainable Information Engineering and Tech-
nology, SIET 2018 - Proceedings, pp. 206–210, 2018.
[19] D. R. Rupal, D. Satasiya, H. Kumar, and A. Agrawal,
“Detection and prevention of arp poisoning in dynamic
ip configuration,” IEEE International Conference on
Recent Trends in Electronics, Information and Commu-
nication Technology (RTEICT), pp. 1240–1244, May
2016.
[20] F. A. Barbhuiya, S. Biswas, and S. Nandi, “An active
host-based intrusion detection system for arp-related
attacks and its verification,” International Journal of
Network Security and Its Applications, vol. 3, no. 3,
pp. 163–180, 2011.
[21] G. Jinhua and X. Kejian, “Arp spoofing detection algo-
rithm using icmp protocol,” in 2013 International Con-
ference on Computer Communication and Informatics,
vol. 3, no. 5, pp. 1–6, Jan. 2013.
[22] J. C. Lin, M. J. Koo, and C. S. Wang, “A proposal for a
schema for arp spoofing protection,” Appl. Mech. Mater.,
vol. 284–287, no. 5, pp. 3275–3279, Jan. 2013.
[23] V. Ramachandran and S. Nandi, “Detecting arp spoofing:
An active technique,” Lect. Notes Comput. Sci. (includ-
ing Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinfor-
matics), vol. 3803, no. 5, pp. 239–250, 2005.
[24] A. Samvedi, S. Owlak, and V. K. Chaurasia, “Improved
secure address resolution protocol,” pp. 201–211, June
2014.
[25] I. Martinovic, F. A. Zdarsky, A. Bachorek, C. Jung, and
J. B. Schmitt, “Phishing in the wireless: Implementation
and analysis,” pp. 145–156, 2007.
[26] A. M. AbdelSalam, W. S. Elkilani, and K. M. Amin,
“An automated approach for preventing arp spoofing at-
tack using static arp entries,” International Journal of
Advanced Computer Science and Applications, vol. 5,
no. 1, 2014.
[27] Z. Trabelsi and K. Shuaib, “Spoofed arp packets detec-
tion in switched lan networks,” SECRYPT 2006 - Int.
Conf. Secur. Cryptogr. Proc., pp. 40–47, 2006.