Detailed Information

Cited 3 time in webofscience Cited 8 time in scopus
Metadata Downloads

RTNSS: a routing trace-based network security system for preventing ARP spoofing attacks

Full metadata record
DC Field Value Language
dc.contributor.authorMoon, Daesung-
dc.contributor.authorLee, Jae Dong-
dc.contributor.authorJeong, Young-Sik-
dc.contributor.authorPark, Jong Hyuk-
dc.date.accessioned2024-08-08T05:00:35Z-
dc.date.available2024-08-08T05:00:35Z-
dc.date.issued2016-05-
dc.identifier.issn0920-8542-
dc.identifier.issn1573-0484-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/18106-
dc.description.abstractThe motion of address resolution protocol (ARP) is done without any problem in a general environment, but it is not considered from the security aspect; therefore, it risks being threatened by an attack from the network called ARP spoofing or ARP poisoning. The attacker can approach the transmission data between hosts by disguising itself as a different host through an ARP spoofing attack and can isolate the host as the target of an attack from the network. In this paper, we propose a routing trace-based network security system for preventing ARP spoofing attacks. Our proposed system includes detection, protection, and recovery techniques to prevent an ARP spoofing attack in the internal network. Whether an ARP spoofing attack occurs is confirmed through the periodic monitoring of the ARP table and a routing trace. The system can prevent ARP spoofing attacks without modifications to the ARP or the addition of cryptographic measures. In addition, it provides security and efficiency by overcoming the weak points of the existing researches.-
dc.format.extent17-
dc.language영어-
dc.language.isoENG-
dc.publisherSPRINGER-
dc.titleRTNSS: a routing trace-based network security system for preventing ARP spoofing attacks-
dc.typeArticle-
dc.publisher.location네델란드-
dc.identifier.doi10.1007/s11227-014-1353-0-
dc.identifier.scopusid2-s2.0-84919359654-
dc.identifier.wosid000374967100004-
dc.identifier.bibliographicCitationJOURNAL OF SUPERCOMPUTING, v.72, no.5, pp 1740 - 1756-
dc.citation.titleJOURNAL OF SUPERCOMPUTING-
dc.citation.volume72-
dc.citation.number5-
dc.citation.startPage1740-
dc.citation.endPage1756-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClasssci-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalWebOfScienceCategoryComputer Science, Hardware & Architecture-
dc.relation.journalWebOfScienceCategoryComputer Science, Theory & Methods-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.subject.keywordAuthorNetwork security-
dc.subject.keywordAuthorRouting trace-
dc.subject.keywordAuthorARP spoofing-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Advanced Convergence Engineering > Department of Computer Science and Artificial Intelligence > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE