Cited 8 time in
RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Moon, Daesung | - |
| dc.contributor.author | Lee, Jae Dong | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.date.accessioned | 2024-08-08T05:00:35Z | - |
| dc.date.available | 2024-08-08T05:00:35Z | - |
| dc.date.issued | 2016-05 | - |
| dc.identifier.issn | 0920-8542 | - |
| dc.identifier.issn | 1573-0484 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/18106 | - |
| dc.description.abstract | The motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP poisoning. The attacker can approach the transmission data between hosts by disguising itself as a different host through an ARP spoofing attack and can isolate the host as the target of an attack from the network. In this paper, we propose a routing trace-based network security system for preventing ARP spoofing attacks. Our proposed system includes detection, protection, and recovery techniques to prevent an ARP spoofing attack in the internal network. Whether an ARP spoofing attack occurs is confirmed through the periodic monitoring of the ARP table and a routing trace. The system can prevent ARP spoofing attacks without modifications to the ARP or the addition of cryptographic measures. In addition, it provides security and efficiency by overcoming the weak points of the existing researches. | - |
| dc.format.extent | 17 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | SPRINGER | - |
| dc.title | RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks | - |
| dc.type | Article | - |
| dc.publisher.location | 네델란드 | - |
| dc.identifier.doi | 10.1007/s11227-014-1353-0 | - |
| dc.identifier.scopusid | 2-s2.0-84919359654 | - |
| dc.identifier.wosid | 000374967100004 | - |
| dc.identifier.bibliographicCitation | JOURNAL OF SUPERCOMPUTING, v.72, no.5, pp 1740 - 1756 | - |
| dc.citation.title | JOURNAL OF SUPERCOMPUTING | - |
| dc.citation.volume | 72 | - |
| dc.citation.number | 5 | - |
| dc.citation.startPage | 1740 | - |
| dc.citation.endPage | 1756 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalResearchArea | Engineering | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
| dc.relation.journalWebOfScienceCategory | Engineering, Electrical & Electronic | - |
| dc.subject.keywordAuthor | Network security | - |
| dc.subject.keywordAuthor | Routing trace | - |
| dc.subject.keywordAuthor | ARP spoofing | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
