2017 Fourth International Conference on Signal Processing, Communication and Networking (ICSCN) 2017
DOI: 10.1109/icscn.2017.8085417
|View full text |Cite
|
Sign up to set email alerts
|

A survey on ARP cache poisoning and techniques for detection and mitigation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 17 publications
0
16
0
Order By: Relevance
“…Some studies [7,[14][15][16][17][18][19][20] in the current literature have carried out a survey to classify and analyze various solutions to mitigate the ARP Cache Poisoning Attack in traditional networks. In [7], authors carry out a survey on MITM attacks in traditional networks.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Some studies [7,[14][15][16][17][18][19][20] in the current literature have carried out a survey to classify and analyze various solutions to mitigate the ARP Cache Poisoning Attack in traditional networks. In [7], authors carry out a survey on MITM attacks in traditional networks.…”
Section: Related Workmentioning
confidence: 99%
“…These future research directions include minimal usage of cryptographic techniques by solutions so that the ARP process is not slowed down; new solutions should be practical with minimal changes in the way traditional ARP works and more preventive techniques should be used instead of just detection, as detection increases the workload of network administrators because of the generation of many alarms. The authors in [15][16][17][18] also discussed many MITM attacks including the ARP Cache Poisoning Attack. A critical evaluation of few solutions to mitigate ARP Cache Poisoning attack is presented in [15][16][17][18], but the solutions are not divided into various categories.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…We note that the previous works [16][17][18][19][20][21][22][23][24] did not consider NSM application within these protocols. Moreover, none [25][26][27][28][29][30][31][32][33][34][35][36][37][38][39][40][41][42] focused on NSM use cases and integration with field devices. In this paper, we tested the lab substation equipment and programs implemented to utilize NSM use cases.…”
mentioning
confidence: 99%