{"id":"https://openalex.org/W2793462199","doi":"https://doi.org/10.1145/3018896.3018915","title":"A mitigation system for ARP cache poisoning attacks","display_name":"A mitigation system for ARP cache poisoning attacks","publication_year":2017,"publication_date":"2017-03-22","ids":{"openalex":"https://openalex.org/W2793462199","doi":"https://doi.org/10.1145/3018896.3018915","mag":"2793462199"},"language":"en","primary_location":{"id":"doi:10.1145/3018896.3018915","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3018915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5109384620","display_name":"B. Prabadevi","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"B. Prabadevi","raw_affiliation_strings":["VIT University, Vellore, India"],"affiliations":[{"raw_affiliation_string":"VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087229821","display_name":"N. Jeyanthi","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. Jeyanthi","raw_affiliation_strings":["VIT University, Vellore, India"],"affiliations":[{"raw_affiliation_string":"VIT University, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5109384620"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.5734,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.71223827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"7"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.7223728895187378},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6687818169593811},{"id":"https://openalex.org/keywords/cache","display_name":"Cache","score":0.6497235894203186},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46191883087158203},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2568047046661377},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16946840286254883},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.05843272805213928},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.04961785674095154}],"concepts":[{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.7223728895187378},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6687818169593811},{"id":"https://openalex.org/C115537543","wikidata":"https://www.wikidata.org/wiki/Q165596","display_name":"Cache","level":2,"score":0.6497235894203186},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46191883087158203},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2568047046661377},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16946840286254883},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.05843272805213928},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.04961785674095154},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3018896.3018915","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3018896.3018915","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1629946144","https://openalex.org/W1999777453","https://openalex.org/W2000036383","https://openalex.org/W2021300949","https://openalex.org/W2031235323","https://openalex.org/W2043732438","https://openalex.org/W2051047794","https://openalex.org/W2073769735","https://openalex.org/W2081855975","https://openalex.org/W2088675683","https://openalex.org/W2122877994","https://openalex.org/W2151222380","https://openalex.org/W2151554935","https://openalex.org/W2295888726","https://openalex.org/W2538722066","https://openalex.org/W2541254540","https://openalex.org/W2785551562","https://openalex.org/W3101837012","https://openalex.org/W4246544032"],"related_works":["https://openalex.org/W2372542233","https://openalex.org/W2356060994","https://openalex.org/W3207948819","https://openalex.org/W2957999883","https://openalex.org/W2357388125","https://openalex.org/W1605665967","https://openalex.org/W3033597088","https://openalex.org/W1533965811","https://openalex.org/W2366024859","https://openalex.org/W2149248898"],"abstract_inverted_index":{"Though":[0],"the":[1,6,14,18,34,39,46,49,60,115,152,160,166,183,195,211],"telecommunication":[2],"protocol":[3],"ARP":[4,51,84,96,127,131,142,196,200],"provides":[5],"most":[7,35,61],"prominent":[8],"service":[9],"for":[10,22,38,45,83,94,190],"data":[11],"transmission":[12],"in":[13,48,55,150],"network":[15,25],"by":[16,112,210],"providing":[17],"physical":[19],"layer":[20,26,120,137],"address":[21],"any":[23,95],"host's":[24],"address,":[27],"its":[28],"stateless":[29],"nature":[30],"remains":[31],"one":[32],"of":[33,58],"well-known":[36],"opportunities":[37],"attacker":[40],"community":[41],"and":[42,67,77,122,135,169],"ultimate":[43],"threat":[44],"hosts":[47],"network.":[50,184],"cache":[52,85],"poisoning":[53],"results":[54],"numerous":[56],"attacks,":[57],"which":[59,198],"noteworthy":[62],"ones":[63],"MITM,":[64],"host":[65,116],"impersonation":[66],"DoS":[68],"attacks.":[69],"This":[70],"paper":[71],"presents":[72],"various":[73],"recent":[74],"mitigation":[75,81],"methods":[76],"proposes":[78],"a":[79,101,113],"novel":[80],"system":[82,90,203],"Poisoning":[86],"Attacks.":[87],"The":[88,185,202],"proposed":[89],"works":[91],"as":[92],"follows:":[93],"Request":[97],"or":[98,110],"Reply":[99],"messages":[100],"time":[102,186],"stamp":[103],"is":[104,108,139,147,163,173,187,204],"generated.":[105],"When":[106],"it":[107],"received":[109],"sent":[111],"host,":[114],"will":[117],"make":[118],"cross":[119,136],"inspection":[121,172],"IP-MAC":[123,161],"pair":[124,162],"matching":[125],"with":[126,144],"table":[128,132,197],"Entry.":[129],"If":[130,149],"entry":[133,192],"matches":[134],"consistency":[138],"ensured":[140],"then":[141,159],"reply":[143],"Time":[145],"Stamp":[146],"sent.":[148],"both":[151],"cases":[153],"evaluated":[154,205],"to":[155,165,175],"be":[156],"bogus":[157],"packet,":[158],"added":[164],"untrusted":[167],"list":[168],"further":[170],"packet":[171],"done":[174],"ensure":[176],"no":[177],"attack":[178],"has":[179],"been":[180],"deployed":[181],"onto":[182],"also":[188],"noted":[189],"each":[191],"made":[193],"into":[194],"makes":[199],"stateful.":[201],"based":[206],"on":[207],"criteria":[208],"specified":[209],"researchers.":[212]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
