A procedure for collecting and labeling man-in-the-middle attack traffic

C Calvert, TM Khoshgoftaar… - International Journal of …, 2017 - World Scientific
In this work, we outline a procedure for collecting and labeling Man-in-the-Middle (MITM)
attack traffic. Our capture procedure allows for the collection of real-world representative …

ARP cache poisoning and routing loops in ad hoc networks

JD Brown, TJ Willink - Mobile Networks and Applications, 2018 - Springer
This paper examines a new application of the well-known ARP spoofing (or ARP cache
poisoning) attack. Traditionally, ARP spoofing has been applied in local area networks to …

Composite CAN XL-Ethernet Networks for Next-Gen Automotive and Automation Systems

G Cena, S Scanzio, A Valenzano - 2023 IEEE 19th …, 2023 - ieeexplore.ieee.org
New generation electrified and self-driving vehicles require much higher performance and
flexibility for onboard digital communications than Controller Area Networks may offer. For …

Generating a Distributed Network Attack Dataset Based on Weather Station IoT Cyber Physical Systems

D Johnson, K Roy - … Intelligence, Big Data, Computing and Data …, 2024 - ieeexplore.ieee.org
There has been a large increase in Internet of Things (IoT) devices used in many parts of
life. These devices, also called edge devices, have been known to be vulnerable to …

Forensic Analysis of an IoT ARP Spoofing Attack

S Friedl, G Pernul - … on Digital Forensics and Security (ISDFS), 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) creates numerous attack opportunities. Address Resolution
Protocol (ARP) spoofing (or cache poisoning) attacks allow hackers to impersonate a PC …

Analisis Simulasi Mitigasi Ancaman ARP Dan Round Trip Time Pada Lalu Lintas DHCP VTP

F Firmansyah, YH Pratama - Progresif: Jurnal Ilmiah …, 2023 - ojs.stmik-banjarbaru.ac.id
Abstract Round-Trip Time (RTT) is the total amount of time it takes to send the signal plus the
total amount of time the signal acknowledges to receive. Communication between …

Prevention of PAC file based attack using DHCP snooping

KR Atul, KP Jevitha - Security in Computing and Communications: 5th …, 2017 - Springer
As part of configuring a large number of systems within a network, the Proxy-Auto
Configuration (PAC) file is used to have a common configuration. This is done by using the …

Analysis and prevention of threats to IoT systems

HM Thakkar, A Agarwal, A Singh, HK Duggal… - AIP Conference …, 2023 - pubs.aip.org
Internet of Things (IoT) is the internetworking of physical devices that detect, collect, process
and exchange data. With the rapid growth of IoT and its widespread adoption, manufacturers …

A new look at an old attack: ARP spoofing to create routing loops in Ad Hoc networks

JD Brown, TJ Willink - Ad Hoc Networks: 9th International Conference …, 2018 - Springer
This paper examines a new application of the well-known ARP spoofing (or ARP cache
poisoning) attack. Traditionally, ARP spoofing has been applied in local area networks to …

Towards a critical review of cybersecurity risks in anti-poaching systems in South Africa

C Steyn - 2022 - scholar.sun.ac.za
Abstract ENGLISH SUMMARY: Anti-poaching operations increasingly make use of a wide
variety of technology for intelligence and communications. These technologies introduce …