D-arp: An efficient scheme to detect and prevent arp spoofing

SM Morsy, D Nashat - IEEE Access, 2022 - ieeexplore.ieee.org
Nowadays, cyber-attack is a severe criminal violation, and it is one of the most active fields
of research. A Man-in-the-middle attack (MITM) is a type of cyber-attack in which an …

DHCP attacking tools: an analysis

M Aldaoud, D Al-Abri, A Al Maashri… - Journal of Computer …, 2021 - Springer
Nowadays, many new devices with network capabilities are constantly being connected to
existing networks. Consequently, the need for an automatic and dynamic approach to supply …

An Analysis of DHCP Vulnerabilities, Attacks, and Countermeasures

AA AbdulGhaffar, SK Paul… - 2023 Biennial Symposium …, 2023 - ieeexplore.ieee.org
A large number of devices use the Dynamic Host Control Protocol (DHCP) protocol to obtain
network configurations like IP address, gateway, Domain Name System (DNS) address, etc …

Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks

S Syed, F Khuhawar, S Talpur… - … on Wireless and …, 2022 - ieeexplore.ieee.org
Dynamic Host Control Protocol (DHCP) is a protocol which provides IP addresses and
network configuration parameters to the hosts present in the network. This protocol is …

A research of mitm attacks in wi-fi networks using single-board computer

A Idiyatullin, PE Abdulkin - 2021 IEEE Conference of Russian …, 2021 - ieeexplore.ieee.org
This article discusses the" Man-In-the-Middle" attack, one of the most famous attacks in the
field of computer security, which causes some difficulties even for security professionals. The …

Machine Learning Approach for Classification of DHCP DoS Attacks in NIDS

S Syed, F Khuhawar, S Talpur - … Quality of Life Using ICT, IoT …, 2021 - ieeexplore.ieee.org
Network Intrusion Detection System (NIDS) is used to detect anomalous activities that occur
in the network, whether the activity arises from outside or from inside. An extensive amount …

Techniques to secure address resolution protocol

S Selvarajan, M Mohan… - 2020 11th international …, 2020 - ieeexplore.ieee.org
Address Resolution Protocol was developed to create a standard for translating IP
addresses to physical addresses. ARP takes (IP, Protocol) as input and converts to physical …

Centralized Dynamic Host Configuration Protocol and Relay Agent for Smart Wireless Router

WA Syafei, YAA Soetrisno… - 2019 6th International …, 2019 - ieeexplore.ieee.org
Serving a Dynamic Host Configuration Protocol (DHCP) request with some additional
services package may cause a conventional wireless router consumes more memory …

Packet Filtering Based On Differentiated Services Code Point For DHCP Starvation Attacks Prevention

A Setyanto - Pekommas, 2019 - neliti.com
The use of the internet today has become a necessity, the most commonly used media to
connect to the internet is a Wireless LAN network. For easy access to the network, DHCP …

[PDF][PDF] A Model to detect and prevent rogue DHCP attacks on wireless LAN communication

FN Wachira - 2021 - su-plus.strathmore.edu
WLAN technology is a crucial component of computer networks. The use of Wi-Fi
communication has grown due to the increasing population of end devices, which includes …