E2BaSeP: Efficient bayes based security protocol against ARP spoofing attacks in SDN architectures

VK Tchendji, F Mvah, CT Djamegni… - Journal of Hardware and …, 2021 - Springer
Virtual networks, just like classical IP networks, usually face many external threats such as
ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) …

Address Resolution Protocol Based Attacks: Prevention and Detection Schemes

D Francis Xavier Christopher, C Divya - … Networks, Big Data and IoT (ICCBI …, 2020 - Springer
Address resolution protocol (ARP) is considered as the important protocol in computer
communications due to frequent usage in individual as well as organization levels. Though …

Reliable Monitoring Security System to Prevent MAC Spoofing in Ubiquitous Wireless Network

SU Ullas, J Sandeep - Advances in Big Data and Cloud Computing …, 2019 - Springer
Ubiquitous computing is a new paradigm in the world of information technology. Security
plays a vital role in such networking environments. However, there are various methods …

(Retracted) Software development and design of network security system based on log data

L Shi, Y Ma, Y Lv, L Chen - Journal of Electronic Imaging, 2023 - spiedigitallibrary.org
The Editor-in-Chief and the publisher have retracted this article, which was submitted as part
of a guest-edited special section. An investigation uncovered evidence of systematic …

Design of hole repair system for wireless sensor networks based on triangle partition

D Wu, H Hu, Z Xie - International Journal of Internet …, 2021 - inderscienceonline.com
Aiming at the problems of low coverage, high redundancy and low repair efficiency in the
current design methods of network hole repair system, a design method of wireless sensor …

[PDF][PDF] Security against ARP Spoofing Attacks using Convolution Neural Networks

G Madhusri, CVG Rao - kalaharijournals.com
There are several hazards and cybersecurity problems associated with ubiquitous
computing, regardless its conveniences. To develop highly secured and enhanced …

[PDF][PDF] Address Auto-Resolution Network System for Neutralizing ARP-Based Attacks

RH Jang, KH Lee, DH Nyang… - KIPS Transactions on …, 2017 - researchgate.net
Address resolution protocol (ARP) is used for binding a logical address to a physical
address in many network technologies. However, since ARP is an stateless protocol, it …

Hardwarové zrcadlo paketů

H Karel - 2019 - dspace.cvut.cz
Diplomová práce se zabývá návrhem a realizací zrcadla paketů určeného k testování 1Gbps
Ethernetových sítí. Zařízení dokáže přeposílat Ethernetové IP pakety až do plné rychlosti …

Access control using information on devices and access locations

Y Onoda, H Yuasa - US Patent 10,218,712, 2019 - Google Patents
Access control within a network is established by combining multiple factors to prevent
unauthorized access to a com puter and/or network target system. The factors which may be …

A Framework of Docker Containers to Minimize Risk of ARP Protocol Poisoning Attack

B Purushothama - 2017 - norma.ncirl.ie
As Docker is slowly transforming the virtualization and deployment world, it is essential it
does not have any security loopholes. But due to resource and kernel sharing with the host …