2021
DOI: 10.1007/s10586-021-03328-x
|View full text |Cite
|
Sign up to set email alerts
|

Denial of ARP spoofing in SDN and NFV enabled cloud-fog-edge platforms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…In [9], Rangisetti et al proposed the SDN features using ARP packets. The authors handled switches using the controller in multiple subnets.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…In [9], Rangisetti et al proposed the SDN features using ARP packets. The authors handled switches using the controller in multiple subnets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…We reviewed the DDoS and ARP spoofing attack using a literature review, which is not implemented In [9], Rangisetti et al proposed the SDN features using ARP packets. The authors handled switches using the controller in multiple subnets.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…In [18], a study is presented that implements several methods for denying ARP spoofing attacks. The D-ARPSpoof solution is implemented on the Open Floodlight controller [31] in the control plane.…”
Section: Related Researchmentioning
confidence: 99%
“…To improve the response time in detecting and mitigating the attack, the current solution is implemented strictly in the data plane [17]. Other studies, although focusing on the data plane, still require a degree of interaction with the control plane [12,18,19], and no other research proposes such an isolated solution. The test networks are created with different congestion levels and with different numbers of devices to offer a comprehensive understanding of the needed computational impact and to clearly identify the feasibility of deploying the solution in certain environments depending on the criticality level.…”
Section: Introductionmentioning
confidence: 99%