{"id":"https://openalex.org/W7139948754","doi":"https://doi.org/10.1016/j.procs.2026.01.061","title":"ML-Based Detection of ARP Spoofing Attacks in Internet-of-Things Environments: Comparative Study","display_name":"ML-Based Detection of ARP Spoofing Attacks in Internet-of-Things Environments: Comparative Study","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139948754","doi":"https://doi.org/10.1016/j.procs.2026.01.061"},"language":"en","primary_location":{"id":"doi:10.1016/j.procs.2026.01.061","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.061","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.1016/j.procs.2026.01.061","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5130234524","display_name":"Omar Almomani","orcid":null},"institutions":[{"id":"https://openalex.org/I104941359","display_name":"Al-Ahliyya Amman University","ror":"https://ror.org/00xddhq60","country_code":"JO","type":"education","lineage":["https://openalex.org/I104941359"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Omar Almomani","raw_affiliation_strings":["Department of Networks and Cybersecurity, Al-Ahliyya Amman University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of Networks and Cybersecurity, Al-Ahliyya Amman University, Amman, Jordan","institution_ids":["https://openalex.org/I104941359"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029351862","display_name":"Tariq Alwada\u2019n","orcid":"https://orcid.org/0000-0002-1826-1247"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Tariq Alwada\u2019n","raw_affiliation_strings":["School of Computing, Engineering & Digital Technologies, Teesside University, Middlesbrough TS1 3BQ, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering & Digital Technologies, Teesside University, Middlesbrough TS1 3BQ, UK","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5130219832","display_name":"Omar Husain Al-Tarawneh","orcid":null},"institutions":[{"id":"https://openalex.org/I145380033","display_name":"Amman Arab University","ror":"https://ror.org/039xekb14","country_code":"JO","type":"education","lineage":["https://openalex.org/I145380033"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Omar Husain Al-Tarawneh","raw_affiliation_strings":["Department of software engineering, Amman Arab University, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Department of software engineering, Amman Arab University, Amman, Jordan","institution_ids":["https://openalex.org/I145380033"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5130234524"],"corresponding_institution_ids":["https://openalex.org/I104941359"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.95062162,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"275","issue":null,"first_page":"523","last_page":"531"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.39559999108314514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.39559999108314514,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.04529999941587448,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.04500000178813934,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6496000289916992},{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.5497999787330627},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.3165999948978424},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.2628999948501587}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9372000098228455},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6496000289916992},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.5497999787330627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.545199990272522},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3239000141620636},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.31779998540878296},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.3165999948978424},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2628999948501587},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2418999969959259},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.225600004196167}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/j.procs.2026.01.061","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.061","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1016/j.procs.2026.01.061","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.procs.2026.01.061","pdf_url":null,"source":{"id":"https://openalex.org/S120348307","display_name":"Procedia Computer Science","issn_l":"1877-0509","issn":["1877-0509"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Procedia Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W3022604549","https://openalex.org/W3024594074","https://openalex.org/W4306827119","https://openalex.org/W4385877748","https://openalex.org/W4391545757","https://openalex.org/W4393048828","https://openalex.org/W4402315873","https://openalex.org/W4404300986","https://openalex.org/W4405062066","https://openalex.org/W4405248489","https://openalex.org/W4407682192","https://openalex.org/W4408331172","https://openalex.org/W4408977962","https://openalex.org/W4409349960","https://openalex.org/W4409473875","https://openalex.org/W4410312660","https://openalex.org/W4410428252","https://openalex.org/W4410784299","https://openalex.org/W4410873987","https://openalex.org/W4411880810","https://openalex.org/W4411880840","https://openalex.org/W4411880913","https://openalex.org/W4412455426","https://openalex.org/W4413434826","https://openalex.org/W4413836940","https://openalex.org/W4414084277","https://openalex.org/W4414184213","https://openalex.org/W4414214625","https://openalex.org/W4414559421","https://openalex.org/W4415129759","https://openalex.org/W4415246455"],"related_works":[],"abstract_inverted_index":{"The":[0,71],"Address":[1],"Resolution":[2],"Protocol":[3],"(ARP)":[4],"spoofing":[5,64,171],"is":[6,74],"a":[7,57,179],"common":[8],"method":[9],"used":[10,89],"by":[11,132],"adversaries":[12],"to":[13,34,44,61,95,182],"attack":[14],"the":[15,68,117,122],"security":[16],"of":[17,19,125],"Internet":[18],"Things":[20],"(IoT)":[21],"networks":[22],"through":[23],"Man-in-the-Middle":[24],"(MITM)":[25],"attacks.":[26],"Lightweight,":[27],"resource-constrained":[28],"IoT":[29,159,184],"devices":[30],"are":[31,41],"often":[32,42],"vulnerable":[33],"these":[35],"attacks;":[36],"thus,":[37],"traditional":[38],"detection":[39,72],"mechanisms":[40],"insufficient":[43],"identify":[45],"and":[46,76,85,93,108,134,142,176],"counteract":[47],"them":[48],"in":[49],"real":[50],"time.":[51],"In":[52],"this":[53],"study,":[54],"we":[55],"proposed":[56],"machine":[58,98,165],"learning-based":[59],"model":[60,73],"detect":[62,169],"ARP":[63,170],"MITM":[65,187],"attacks":[66,172],"using":[67],"IoTID20":[69],"dataset.":[70],"systematic":[75],"includes":[77],"dataset":[78],"extraction,":[79],"preprocessing,":[80],"train-test":[81],"splitting,":[82],"classifier":[83],"training,":[84],"performance":[86],"evaluation.":[87],"We":[88],"accuracy,":[90],"precision,":[91],"recall,":[92],"F1-score":[94],"evaluate":[96],"eleven":[97],"learning":[99,166],"classifiers,":[100],"including":[101],"tree-based":[102],"ensembles,":[103],"linear":[104],"models,":[105],"kernel-based":[106],"methods,":[107],"optimization-driven":[109],"algorithms.":[110],"Results":[111],"show":[112],"that":[113,164],"ensemble":[114],"methods":[115],"performed":[116,144],"best,":[118],"with":[119,173],"LightGBM":[120],"achieving":[121],"highest":[123],"score":[124],"99.7%":[126],"across":[127],"all":[128],"four":[129],"metrics,":[130],"followed":[131],"XGBoost":[133],"Random":[135],"Forest.":[136],"Simpler":[137],"algorithms":[138],"like":[139],"logistic":[140],"regression":[141],"ridge":[143],"less":[145],"well":[146],"but":[147],"still":[148],"delivered":[149],"competitive":[150],"results,":[151],"indicating":[152],"their":[153],"potential":[154],"for":[155],"deployment":[156],"on":[157],"resource-limited":[158],"devices.":[160],"These":[161],"findings":[162],"demonstrate":[163],"can":[167],"effectively":[168],"high":[174],"accuracy":[175],"efficiency,":[177],"offering":[178],"promising":[180],"approach":[181],"securing":[183],"environments":[185],"against":[186],"threats.":[188]},"counts_by_year":[],"updated_date":"2026-03-22T06:25:25.174409","created_date":"2026-03-21T00:00:00"}
