Forensic Analysis of an IoT ARP Spoofing Attack

S Friedl, G Pernul - … on Digital Forensics and Security (ISDFS), 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) creates numerous attack opportunities. Address Resolution
Protocol (ARP) spoofing (or cache poisoning) attacks allow hackers to impersonate a PC …

[PDF][PDF] Emulation and Detection of ARP Attacks in GNS3 Environment: Modelling and Development of a Defense Strategy

T Vakaliuk, Y Trokoz, O Pokotylo, V Osadchyi… - 2024 - ceur-ws.org
The article discusses various types of attacks on the ARP protocol and the tools used to
implement and detect them. The principal network vulnerabilities related to the lack of …

Detecting and Preventing ARP Spoofing Attacks Using Real-Time Data Analysis and Machine Learning

M Kumar, CS Dash - International Journal of Innovative …, 2024 - ijircst.irpublications.org
ARP spoofing attacks contain certain risks in networks as they seem to intercept traffic and
can lead the leakage of intellectual information. This research paper focuses on enhancing …

[PDF][PDF] " Navigating Network Security: Analyzing ARP's Role, Challenges, and Solutions in Ethernet and IEEE 802.11 Environments

AMIA Abdullah, M Galde - 2023 - researchgate.net
Address Resolution Protocol abbreviated as ARP is defined as a procedure for constructing
and mapping a dynamic IP address towards a permanent physical machine. In its …