2013 3rd IEEE International Advance Computing Conference (IACC) 2013
DOI: 10.1109/iadcc.2013.6514211
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of ARP spoofing: A probe packet based technique

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(9 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…Even entries that have not expired are rewritten whenever an ARP reply packet arrives. A host has no means of authenticating an ARP protocol packet"s source [25]. Two simple spoofing techniques may be used that exploit this vulnerability in the ARP protocol:…”
Section: Arp Cache Poisoning and Spoofing Attackmentioning
confidence: 99%
“…Even entries that have not expired are rewritten whenever an ARP reply packet arrives. A host has no means of authenticating an ARP protocol packet"s source [25]. Two simple spoofing techniques may be used that exploit this vulnerability in the ARP protocol:…”
Section: Arp Cache Poisoning and Spoofing Attackmentioning
confidence: 99%
“…A Probe packet based technique with enhanced spoof detection engine was used by Poonam Pandey to prevent the ARP cache poisoning attacks [13]. It uses the verifier table and handler algorithm to detect the attacker.…”
Section: Introductionmentioning
confidence: 99%
“…ARP spoofing is a type of attack and it is a major problem in the local area network (LAN) and can lead to many other attacks , , , . ARP spoofing is a malicious attack that sends falsified ARP messages over a LAN that leads to associated linking of an attacker's MAC address with the IP address of a legitimate computer or server on the network.…”
Section: Introductionmentioning
confidence: 99%