Various Solutions for Address Resolution Protocol Spoofing Attacks
暂无分享,去创建一个
[1] C. V. Guru Rao. A Frame Work for Single Sketch Based Multibiometric Cryptosystems , 2013 .
[2] Yunlan Zhao,et al. Research on the Defense Against ARP Spoofing Attacks Based on Winpcap , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[3] Santosh Biswas,et al. An Active Intrusion Detection System for LAN Specific Attacks , 2010, AST/UCMA/ISA/ACN.
[4] Zhiping Jiang,et al. The detection and prevention for ARP Spoofing based on Snort , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).
[5] Dongwon Kim,et al. Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks , 2010, IEEE Communications Letters.
[6] A. Govardhan,et al. Discovering Multi-Level Association Rules using FuzzyHierarchies , 2014 .
[7] Cristina L. Abad,et al. Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt , 2009, 2009 Latin American Network Operations and Management Symposium.
[8] Kumara Swamy. Authentication in Android Smart Phones Using Gestures and Security Pin , 2013 .
[9] Sukumar Nandi,et al. Detecting ARP Spoofing: An Active Technique , 2005, ICISS.
[10] Andrew R. Baker,et al. Snort 2.1 intrusion detection , 2004 .
[11] Young-Gab Kim,et al. ASA: Agent-based secure ARP cache management , 2012, IET Commun..
[12] Usha Rani,et al. Mining Multi Level Association Rules Using Fuzzy Logic , 2013 .
[13] Santosh Biswas,et al. An Active Host-Based Detection Mechanism for ARP-Related Attacks , 2011 .
[14] W. Lilakiatsakun,et al. P-ARP: A novel enhanced authentication scheme for securing ARP , 2011 .
[15] Patrick D. McDaniel,et al. TARP: ticket-based address resolution protocol , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[16] Chin-Tser Huang,et al. A secure address resolution protocol , 2003, Comput. Networks.
[17] Danilo Bruschi,et al. S-ARP: a secure address resolution protocol , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[18] S. P. Anandraj,et al. Enhancement of Content Distribution and Verification in Network Coding , 2013 .
[19] Roney Philip. Securing Wireless Networks from ARP Cache Poisoning , 2007 .
[20] R. Vijaya Prakash,et al. Knowledge Discovery from Dynamically Evolving User Profiles , 2014 .
[21] T. Chomsiri,et al. Architecture and Protocols for Secure LAN by Using a Software-Level Certificate and Cancellation of ARP Protocol , 2008, 2008 Third International Conference on Convergence and Hybrid Information Technology.
[22] G GoudaMohamed,et al. A secure address resolution protocol , 2003 .
[23] K. N. Dollman,et al. - 1 , 1743 .
[24] Wassim El-Hajj,et al. Preventing ARP Attacks Using a Fuzzy-Based Stateful ARP Cache , 2007, 2007 IEEE International Conference on Communications.
[25] Jin-Wook Chung,et al. Network Security Management Using ARP Spoofing , 2004, ICCSA.
[26] Vipul Goyal,et al. An Efficient Solution to the ARP Cache Poisoning Problem , 2005, ACISP.