2022
DOI: 10.1109/access.2022.3172329
|View full text |Cite
|
Sign up to set email alerts
|

D-ARP: An Efficient Scheme to Detect and Prevent ARP Spoofing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…ARP packets convert IP addresses to MAC addresses when communicating on a local area network. Several vulnerabilities in the ARP protocol might be used in attacks [8]. The initial stage in a MitM attack is changing the ARP tables on the victim's PC and the router.…”
Section: Problem Statementmentioning
confidence: 99%
“…ARP packets convert IP addresses to MAC addresses when communicating on a local area network. Several vulnerabilities in the ARP protocol might be used in attacks [8]. The initial stage in a MitM attack is changing the ARP tables on the victim's PC and the router.…”
Section: Problem Statementmentioning
confidence: 99%