2011
DOI: 10.1007/978-3-642-17878-8_44
|View full text |Cite
|
Sign up to set email alerts
|

An Active Host-Based Detection Mechanism for ARP-Related Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…The ARP inspection module automatically binds the correct gateway IP -MAC address in static mode. Likewise, Barbhuiya et al [20] used a hostbased intrusion detection system to detect ARP attacks. Their approach checked the integrity and authenticity of ARP replies using a combination of digital signatures and one time passwords based on hash chains.…”
Section: Host-based Approachesmentioning
confidence: 99%
“…The ARP inspection module automatically binds the correct gateway IP -MAC address in static mode. Likewise, Barbhuiya et al [20] used a hostbased intrusion detection system to detect ARP attacks. Their approach checked the integrity and authenticity of ARP replies using a combination of digital signatures and one time passwords based on hash chains.…”
Section: Host-based Approachesmentioning
confidence: 99%
“…These attacks come in two forms as bandwidth depletion attacks and application layer attacks. First category of attacks target system reneminath@iiti.ac.in Indian Institute of Technology Indore, India sources and affect all applications/services running on the system [3], [15]. Application layer DoS attacks exploit the behavior of applications to target them.…”
Section: Introductionmentioning
confidence: 99%