E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures
Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facil...
        Saved in:
      
    
          | Published in | Journal of hardware and systems security Vol. 5; no. 1; pp. 58 - 74 | 
|---|---|
| Main Authors | , , , | 
| Format | Journal Article | 
| Language | English | 
| Published | 
        Cham
          Springer International Publishing
    
        01.03.2021
     Springer Nature B.V  | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2509-3428 2509-3436  | 
| DOI | 10.1007/s41635-020-00105-x | 
Cover
| Abstract | Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facilitating users’ impersonation and forged IP-MAC pair insertion into the victims’ ARP caches. This type of attack is the beginning of more dangerous attacks such as man-in-the-middle and denial-of-service. Several solutions based on SDN (Software-Defined Network) technology, known for their suitable adaptation to large-scale networks, have been proposed. These solutions use a global ARP cache built into the controller which contains the virtual machines’ IP-MAC pairs, as attacker detection knowledge. The main drawbacks of these methods are the collection and unsecured storage of IP-MAC pairs into the global ARP cache and failure to consider IP address reallocation cases, as well as users’ connection and reconnection scenarios in the attacker detection process. To remedy these shortcomings, we propose an Efficient Bayes Based Security Protocol (E2BaSeP) which detects attackers using a Bayes-based algorithm. This solution works in both dynamically and statically addressing networks. Simulation results show that the E2BaSeP protocol provides effective protection for ARP caches and performs better than those observed in the literature. | 
    
|---|---|
| AbstractList | Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facilitating users’ impersonation and forged IP-MAC pair insertion into the victims’ ARP caches. This type of attack is the beginning of more dangerous attacks such as man-in-the-middle and denial-of-service. Several solutions based on SDN (Software-Defined Network) technology, known for their suitable adaptation to large-scale networks, have been proposed. These solutions use a global ARP cache built into the controller which contains the virtual machines’ IP-MAC pairs, as attacker detection knowledge. The main drawbacks of these methods are the collection and unsecured storage of IP-MAC pairs into the global ARP cache and failure to consider IP address reallocation cases, as well as users’ connection and reconnection scenarios in the attacker detection process. To remedy these shortcomings, we propose an Efficient Bayes Based Security Protocol (E2BaSeP) which detects attackers using a Bayes-based algorithm. This solution works in both dynamically and statically addressing networks. Simulation results show that the E2BaSeP protocol provides effective protection for ARP caches and performs better than those observed in the literature. | 
    
| Author | Tchendji, Vianney Kengne Mvah, Fabrice Yankam, Yannick Florian Djamegni, Clémentin Tayou  | 
    
| Author_xml | – sequence: 1 givenname: Vianney Kengne orcidid: 0000-0003-3836-1859 surname: Tchendji fullname: Tchendji, Vianney Kengne email: vianneykengne@yahoo.fr organization: Department of Mathematics and Computer Science, University of Dschang – sequence: 2 givenname: Fabrice surname: Mvah fullname: Mvah, Fabrice organization: Department of Mathematics and Computer Science, University of Dschang – sequence: 3 givenname: Clémentin Tayou surname: Djamegni fullname: Djamegni, Clémentin Tayou organization: Department of Mathematics and Computer Science, University of Dschang, Department of Computer Engineering, University of Dschang – sequence: 4 givenname: Yannick Florian surname: Yankam fullname: Yankam, Yannick Florian organization: Department of Mathematics and Computer Science, University of Dschang  | 
    
| BookMark | eNp9kE1LAzEQhoMoWGv_gKeA59V8bXbX27bWDyharJ5DdszWaE1qkkL7712tKHjoZWYO7zMzPEdo33lnEDqh5IwSUpxHQSXPM8JIRgglebbeQz2Wkyrjgsv935mVh2gQo20Ip0zyouI91IzZUM_M9AKP29aCNS7hod6Y2NVonvHMwCrYtMHT4JMHv8D1XFsXE64fpni29L61bo7rlDS8RWwdnl3e4TrAi00G0iqYeIwOWr2IZvDT--jpavw4uskm99e3o3qSAZVinZUyp5SAaKtKF0AbkutKQ0tII0pREqmpZBxMkxem1FJAqw2ApoUBJkXBc95Hp9u9y-A_ViYm9epXwXUnFas4K4UQlHUptk1B8DEG06plsO86bBQl6kun2upUnU71rVOtO6j8B4FNOlnvUtB2sRvlWzR2d9zchL-vdlCfOg6LLA | 
    
| CitedBy_id | crossref_primary_10_1016_j_cose_2023_103696 crossref_primary_10_1007_s11277_025_11748_w crossref_primary_10_1109_TDSC_2022_3162312 crossref_primary_10_3390_electronics12143077 crossref_primary_10_1109_ACCESS_2022_3172329 crossref_primary_10_1007_s10207_023_00749_0  | 
    
| Cites_doi | 10.1109/SIET.2018.8693155 10.1109/ICCTA37466.2015.9513433 10.35940/ijeat.B3801.129219 10.1109/ICC.2007.228 10.1109/ECTICON.2009.5137193 10.1109/JPROC.2014.2371999 10.1109/ICOIN.2019.8718158 10.1109/ITME.2018.00166 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195 10.1109/SECON.2016.7506644 10.1109/ICCASM.2010.5619113 10.1007/s11227-014-1353-0 10.14722/ndss.2015.23064 10.1109/CSIE.2009.122 10.1109/LCN.2016.83 10.1109/ICATCCT.2015.7456999 10.1109/SETIT.2012.6481988 10.14569/IJACSA.2017.080474 10.1109/ICACC.2015.66 10.1109/ICDCSW.2007.19 10.1145/2979779.2983928 10.1109/LANOMS.2009.5338799 10.3390/electronics8101095 10.1109/LCOMM.2010.02.092108 10.1109/MCOM.2013.6461198  | 
    
| ContentType | Journal Article | 
    
| Copyright | Springer Nature Switzerland AG 2020 Springer Nature Switzerland AG 2020.  | 
    
| Copyright_xml | – notice: Springer Nature Switzerland AG 2020 – notice: Springer Nature Switzerland AG 2020.  | 
    
| DBID | AAYXX CITATION 8FE 8FG ABJCF AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- L6V M7S P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS  | 
    
| DOI | 10.1007/s41635-020-00105-x | 
    
| DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection (via ProQuest) ProQuest Computer Science Collection Computer Science Database (Proquest) ProQuest Engineering Collection Engineering Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China Engineering Collection  | 
    
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Advanced Technologies & Aerospace Collection Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition Materials Science & Engineering Collection ProQuest One Academic ProQuest One Academic (New)  | 
    
| DatabaseTitleList | Computer Science Database  | 
    
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database  | 
    
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISSN | 2509-3436 | 
    
| EndPage | 74 | 
    
| ExternalDocumentID | 10_1007_s41635_020_00105_x | 
    
| GroupedDBID | -EM 0R~ 406 AACDK AAHNG AAIAL AAJBT AANZL AARHV AASML AATNV AATVU AAUYE AAYUE ABAKF ABDZT ABECU ABFTV ABJCF ABJNI ABJOX ABKCH ABMQK ABQBU ABTEG ABTKH ABTMW ABXPI ACAOD ACDTI ACGFS ACHSB ACMLO ACOKC ACPIV ACZOJ ADHHG ADKNI ADKPE ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEJRE AEMSY AEOHA AESKC AEVLU AEXYK AFBBN AFKRA AFQWF AGDGC AGMZJ AGQEE AGRTI AHKAY AHSBF AIAKS AIGIU AILAN AITGF AJRNO AJZVZ ALFXC ALMA_UNASSIGNED_HOLDINGS AMKLP AMXSW AMYLF AMYQR ARAPS AXYYD BENPR BGLVJ BGNMA CCPQU CSCUP DNIVK DPUIP EBLON EBS EIOEI EJD FERAY FIGPU FINBP FNLPD FSGXE GGCAI GJIRD H13 HCIFZ IKXTQ IWAJR J-C JZLTJ K7- KOV LLZTM M4Y M7S NPVJJ NQJWS NU0 O9J PT4 PTHSS RLLFE ROL RSV SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE TSG UOJIU UTJUX UZXMN VFIZW Z7R Z7X Z88 ZMTXR AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC AEZWR AFDZB AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 8FE 8FG AZQEC DWQXO GNUQQ JQ2 L6V P62 PKEHL PQEST PQQKQ PQUKI PRINS  | 
    
| ID | FETCH-LOGICAL-c164x-865110c4f99a7c1b05a9acf00b484806a1623ceb57e8a64cfaecca17ec2647353 | 
    
| IEDL.DBID | BENPR | 
    
| ISSN | 2509-3428 | 
    
| IngestDate | Fri Jul 25 10:56:51 EDT 2025 Wed Oct 01 04:31:22 EDT 2025 Thu Apr 24 23:08:20 EDT 2025 Fri Feb 21 02:50:02 EST 2025  | 
    
| IsPeerReviewed | true | 
    
| IsScholarly | true | 
    
| Issue | 1 | 
    
| Keywords | Dynamic addressing Bayes probabilities Software-defined network Global ARP cache ARP spoofing Virtual networks  | 
    
| Language | English | 
    
| LinkModel | DirectLink | 
    
| MergedId | FETCHMERGED-LOGICAL-c164x-865110c4f99a7c1b05a9acf00b484806a1623ceb57e8a64cfaecca17ec2647353 | 
    
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14  | 
    
| ORCID | 0000-0003-3836-1859 | 
    
| PQID | 2932844412 | 
    
| PQPubID | 6623297 | 
    
| PageCount | 17 | 
    
| ParticipantIDs | proquest_journals_2932844412 crossref_primary_10_1007_s41635_020_00105_x crossref_citationtrail_10_1007_s41635_020_00105_x springer_journals_10_1007_s41635_020_00105_x  | 
    
| ProviderPackageCode | CITATION AAYXX  | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 20210300 2021-03-00 20210301  | 
    
| PublicationDateYYYYMMDD | 2021-03-01 | 
    
| PublicationDate_xml | – month: 3 year: 2021 text: 20210300  | 
    
| PublicationDecade | 2020 | 
    
| PublicationPlace | Cham | 
    
| PublicationPlace_xml | – name: Cham – name: Gainesville  | 
    
| PublicationTitle | Journal of hardware and systems security | 
    
| PublicationTitleAbbrev | J Hardw Syst Secur | 
    
| PublicationYear | 2021 | 
    
| Publisher | Springer International Publishing Springer Nature B.V  | 
    
| Publisher_xml | – name: Springer International Publishing – name: Springer Nature B.V  | 
    
| References | Trabelsi Z, El-Hajj W (2007) Preventing ARP attacks using a fuzzy-based stateful ARP cache. In: 2007 IEEE international conference on communications, pp 1355–1360. https://doi.org/10.1109/ICC.2007.228 Sahoo SK, Mishra KS, Sahoo S, Sahoo B (2017) Software defined network: the next generation Internet technology Fahad U, Rashid A, Faisal B, Muhammad M (2017) Mitigating address spoofing attacks in hybrid SDN. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2017.080474 MoonDLeeJDJeongYSParkJHRTNSS: A routing trace-based network security system for preventing ARP spoofing attacksJ Supercomput2014721740175610.1007/s11227-014-1353-010.1007/s11227-014-1353-0 NamYSKimDKimJEnhanced ARP: preventing ARP poisoning-based man-in-the-middle attacksIEEE Commun Lett20101418718910.1109/LCOMM.2010.02.09210810.1109/LCOMM.2010.02.092108 Ma H, Ding H, Yang Y, Mi Z, Zhang M (2015) SDN-based ARP attack detection for cloud centers. In: 2015 IEEE 12th intl conf on ubiquitous intelligence and computing and 2015 IEEE 12th intl conf on autonomic and trusted computing and IEEE 15th intl conf on scalable computing and communications and its associated workshops (UIC-ATC-ScalCom), Beijing. vol 00 pp 1049–1054. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195 Kim Y, Ahn S, Thang CN, Choi D, Park M (2019) ARP Poisoning attack detection based on ARP update state in software-defined networks. In: 2019 International conference on information networking (ICOIN), pp 366–371. https://doi.org/10.1109/ICOIN.2019.8718158 Shukla S, Yadav I (2015) An innovative method for detection and prevention against ARP spoofing in MANET. International Journal of Computer Science and Information Technology and Security (IJCSITS) CoxHJClarkJROwenLHLeveraging SDN for ARP securitySoutheastCon201620161810.1109/SECON.2016.7506644 Abad LC, Bonilla IR (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: 27th International conference on distributed computing systems workshops (ICDCSW’07), pp 60–60. https://doi.org/10.1109/ICDCSW.2007.19 Plummer CD (1982) An ethernet address resolution protocol. INTERNET STANDARD. https://tools.ietf.org/html/rfc826.Accessed08January2020 Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP spoof problem. In: 2009 6th International conference on electrical engineering/electronics, computer telecommunications and information technology, vol 02, pp 910–913. https://doi.org/10.1109/ECTICON.2009.5137193 HouXJiangZTianXThe detection and prevention for ARP spoofing based on snortInt Conf Comput Appl Syst Model2010513713910.1109/ICCASM.2010.5619113 ChauhanAYadavKRDetection of MAC spoofing using SVM techniqueInt J Comput Sci Technol20167194197 Lallo R, Lospoto G, Rimondini M, Battista G (2016) How to handle ARP in a software-defined network ZawarSSteveCMitigating ARP cache poisoning attack in software-defined networking (SDN): a surveyElectronics20198109510.3390/electronics8101095 Ortega PA, Marcos EX, Chiang DL, Abad LC (2009) Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin american network operations and management symposium, LANOMS 2009, Punta del Este, Uruguay, October 19-21, 2009, Proceedings. https://doi.org/10.1109/LANOMS.2009.5338799 Oliveira SLR, Schweitzer MC, Shinoda AA, Prete RL (2014) Using Mininet for emulation and prototyping Software-Defined Networks Data M (2018) The defense against ARP spoofing attack using semi-static ARP cache table. In: 2018 International conference on sustainable information engineering and technology (SIET), pp 206–210. https://doi.org/10.1109/SIET.2018.8693155 Loriya TH, Kulshreshta A, Keraliya RD (2017) Security analysis of various public key cryptosystems for authentication and key agreement in wireless communication network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) Mohan D, Rishabh P, Kshiteej M, Vijay M (2015) SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February pp 8–11. https://doi.org/10.14722/ndss.2015.23064 YeganehHSTootoonchianAGanjaliYOn scalability of software-defined networkingIEEE Commun Mag20135113614110.1109/MCOM.2013.646119810.1109/MCOM.2013.6461198 Gao W, Sun Y, Fu Q, Wu Z, Ma X, Zheng K, Huang X (2018) ARP poisoning prevention in Internet of Things. IEEE Communications Letters, 733–736, International Conference on Information Technology in Medicine and Education (ITME) Jehan N, Haneef MA (2015) Scalable ethernet architecture using SDN by suppressing broadcast traffic. In: 2015 Fifth international conference on advances in computing and communications (ICACC), pp 24–27. https://doi.org/10.1109/ICACC.2015.66 Balagopal D, Rani KAX (2015) NetWatch: Empowering software-defined network switches for packet filtering. In: 2015 International conference on applied and theoretical computing and communication technology (iCATccT), pp 837–840. https://doi.org/10.1109/ICATCCT.2015.7456999 Sagar KS, Sagarika M, Mayank T, Kishore BM, Bibhudatta S (2019) A comprehensive tutorial on software defined network: The driving force for the future internet technology. In: Proceedings of the international conference on advances in information communication technology and computing New York, NY, USA. https://doi.org/10.1145/2979779.2983928 Abdelsalam MA, Ashraf E, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: Conference: ICCTA 2015, At Alexandria, Egypt Divya C, Christopher XFD (2019) SM-ARP: stochastic Markovian game model for packet forwarding based ARP spoofing attacks detection. International Journal of Engineering and Advanced Technology (IJEAT) Boughrara A, Mammar S (2012) Implementation of a SNORT’s output Plug-In in reaction to ARP Spoofing’s attack. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT), pp 643–647. https://doi.org/10.1109/SETIT.2012.6481988 DivyaCChristopherXFDSecurity against ARP spoofing attacks using Bayesian support vector regressionInt J Innov Tech Explor Eng (IJITEE)2019822783075 Alharbi T, Durando D, Pakzad F, Portmann M (2016) Securing ARP in software defined networks. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 523-526. https://doi.org/10.1109/LCN.2016.83 QianAThe automatic prevention and control research of ARP deception and implementationWRI World Congr Comput Sci Inf Eng2009255555810.1109/CSIE.2009.122 BalagopalDRaniXAKA technique for a software-defined and network-based ARP spoof detection and mitigationInt J Appl Eng Res2018131482314826 KreutzDRamosVMFVeríssimoEPRothenbergECAzodolmolkySUhligSSoftware-defined networking: a comprehensive surveyProc IEEE2015103147610.1109/JPROC.2014.237199910.1109/JPROC.2014.2371999 HJ Cox (105_CR28) 2016; 2016 105_CR1 105_CR3 105_CR2 105_CR5 YS Nam (105_CR33) 2010; 14 HS Yeganeh (105_CR7) 2013; 51 105_CR19 105_CR29 105_CR27 105_CR26 105_CR24 105_CR23 105_CR22 105_CR21 105_CR20 A Chauhan (105_CR6) 2016; 7 D Moon (105_CR4) 2014; 72 S Zawar (105_CR25) 2019; 8 X Hou (105_CR15) 2010; 5 105_CR18 105_CR8 105_CR17 D Balagopal (105_CR11) 2018; 13 D Kreutz (105_CR31) 2015; 103 C Divya (105_CR9) 2019; 8 105_CR14 105_CR13 105_CR12 105_CR34 105_CR10 105_CR32 A Qian (105_CR16) 2009; 2 105_CR30  | 
    
| References_xml | – reference: Plummer CD (1982) An ethernet address resolution protocol. INTERNET STANDARD. https://tools.ietf.org/html/rfc826.Accessed08January2020 – reference: Jehan N, Haneef MA (2015) Scalable ethernet architecture using SDN by suppressing broadcast traffic. In: 2015 Fifth international conference on advances in computing and communications (ICACC), pp 24–27. https://doi.org/10.1109/ICACC.2015.66 – reference: QianAThe automatic prevention and control research of ARP deception and implementationWRI World Congr Comput Sci Inf Eng2009255555810.1109/CSIE.2009.122 – reference: Ma H, Ding H, Yang Y, Mi Z, Zhang M (2015) SDN-based ARP attack detection for cloud centers. In: 2015 IEEE 12th intl conf on ubiquitous intelligence and computing and 2015 IEEE 12th intl conf on autonomic and trusted computing and IEEE 15th intl conf on scalable computing and communications and its associated workshops (UIC-ATC-ScalCom), Beijing. vol 00 pp 1049–1054. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195 – reference: Loriya TH, Kulshreshta A, Keraliya RD (2017) Security analysis of various public key cryptosystems for authentication and key agreement in wireless communication network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE) – reference: Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP spoof problem. In: 2009 6th International conference on electrical engineering/electronics, computer telecommunications and information technology, vol 02, pp 910–913. https://doi.org/10.1109/ECTICON.2009.5137193 – reference: Alharbi T, Durando D, Pakzad F, Portmann M (2016) Securing ARP in software defined networks. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 523-526. https://doi.org/10.1109/LCN.2016.83 – reference: Mohan D, Rishabh P, Kshiteej M, Vijay M (2015) SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February pp 8–11. https://doi.org/10.14722/ndss.2015.23064 – reference: Gao W, Sun Y, Fu Q, Wu Z, Ma X, Zheng K, Huang X (2018) ARP poisoning prevention in Internet of Things. IEEE Communications Letters, 733–736, International Conference on Information Technology in Medicine and Education (ITME) – reference: Sahoo SK, Mishra KS, Sahoo S, Sahoo B (2017) Software defined network: the next generation Internet technology – reference: NamYSKimDKimJEnhanced ARP: preventing ARP poisoning-based man-in-the-middle attacksIEEE Commun Lett20101418718910.1109/LCOMM.2010.02.09210810.1109/LCOMM.2010.02.092108 – reference: Trabelsi Z, El-Hajj W (2007) Preventing ARP attacks using a fuzzy-based stateful ARP cache. In: 2007 IEEE international conference on communications, pp 1355–1360. https://doi.org/10.1109/ICC.2007.228 – reference: ChauhanAYadavKRDetection of MAC spoofing using SVM techniqueInt J Comput Sci Technol20167194197 – reference: ZawarSSteveCMitigating ARP cache poisoning attack in software-defined networking (SDN): a surveyElectronics20198109510.3390/electronics8101095 – reference: HouXJiangZTianXThe detection and prevention for ARP spoofing based on snortInt Conf Comput Appl Syst Model2010513713910.1109/ICCASM.2010.5619113 – reference: Boughrara A, Mammar S (2012) Implementation of a SNORT’s output Plug-In in reaction to ARP Spoofing’s attack. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT), pp 643–647. https://doi.org/10.1109/SETIT.2012.6481988 – reference: KreutzDRamosVMFVeríssimoEPRothenbergECAzodolmolkySUhligSSoftware-defined networking: a comprehensive surveyProc IEEE2015103147610.1109/JPROC.2014.237199910.1109/JPROC.2014.2371999 – reference: Data M (2018) The defense against ARP spoofing attack using semi-static ARP cache table. In: 2018 International conference on sustainable information engineering and technology (SIET), pp 206–210. https://doi.org/10.1109/SIET.2018.8693155 – reference: CoxHJClarkJROwenLHLeveraging SDN for ARP securitySoutheastCon201620161810.1109/SECON.2016.7506644 – reference: BalagopalDRaniXAKA technique for a software-defined and network-based ARP spoof detection and mitigationInt J Appl Eng Res2018131482314826 – reference: Oliveira SLR, Schweitzer MC, Shinoda AA, Prete RL (2014) Using Mininet for emulation and prototyping Software-Defined Networks – reference: Ortega PA, Marcos EX, Chiang DL, Abad LC (2009) Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin american network operations and management symposium, LANOMS 2009, Punta del Este, Uruguay, October 19-21, 2009, Proceedings. https://doi.org/10.1109/LANOMS.2009.5338799 – reference: Fahad U, Rashid A, Faisal B, Muhammad M (2017) Mitigating address spoofing attacks in hybrid SDN. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2017.080474 – reference: Divya C, Christopher XFD (2019) SM-ARP: stochastic Markovian game model for packet forwarding based ARP spoofing attacks detection. International Journal of Engineering and Advanced Technology (IJEAT) – reference: Shukla S, Yadav I (2015) An innovative method for detection and prevention against ARP spoofing in MANET. International Journal of Computer Science and Information Technology and Security (IJCSITS) – reference: Balagopal D, Rani KAX (2015) NetWatch: Empowering software-defined network switches for packet filtering. In: 2015 International conference on applied and theoretical computing and communication technology (iCATccT), pp 837–840. https://doi.org/10.1109/ICATCCT.2015.7456999 – reference: YeganehHSTootoonchianAGanjaliYOn scalability of software-defined networkingIEEE Commun Mag20135113614110.1109/MCOM.2013.646119810.1109/MCOM.2013.6461198 – reference: MoonDLeeJDJeongYSParkJHRTNSS: A routing trace-based network security system for preventing ARP spoofing attacksJ Supercomput2014721740175610.1007/s11227-014-1353-010.1007/s11227-014-1353-0 – reference: Kim Y, Ahn S, Thang CN, Choi D, Park M (2019) ARP Poisoning attack detection based on ARP update state in software-defined networks. In: 2019 International conference on information networking (ICOIN), pp 366–371. https://doi.org/10.1109/ICOIN.2019.8718158 – reference: Abad LC, Bonilla IR (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: 27th International conference on distributed computing systems workshops (ICDCSW’07), pp 60–60. https://doi.org/10.1109/ICDCSW.2007.19 – reference: DivyaCChristopherXFDSecurity against ARP spoofing attacks using Bayesian support vector regressionInt J Innov Tech Explor Eng (IJITEE)2019822783075 – reference: Abdelsalam MA, Ashraf E, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: Conference: ICCTA 2015, At Alexandria, Egypt – reference: Sagar KS, Sagarika M, Mayank T, Kishore BM, Bibhudatta S (2019) A comprehensive tutorial on software defined network: The driving force for the future internet technology. In: Proceedings of the international conference on advances in information communication technology and computing New York, NY, USA. https://doi.org/10.1145/2979779.2983928 – reference: Lallo R, Lospoto G, Rimondini M, Battista G (2016) How to handle ARP in a software-defined network – ident: 105_CR10 doi: 10.1109/SIET.2018.8693155 – ident: 105_CR20 doi: 10.1109/ICCTA37466.2015.9513433 – ident: 105_CR1 doi: 10.35940/ijeat.B3801.129219 – ident: 105_CR5 doi: 10.1109/ICC.2007.228 – ident: 105_CR24 – volume: 8 start-page: 2278 year: 2019 ident: 105_CR9 publication-title: Int J Innov Tech Explor Eng (IJITEE) – ident: 105_CR13 doi: 10.1109/ECTICON.2009.5137193 – volume: 103 start-page: 14 year: 2015 ident: 105_CR31 publication-title: Proc IEEE doi: 10.1109/JPROC.2014.2371999 – ident: 105_CR29 doi: 10.1109/ICOIN.2019.8718158 – ident: 105_CR2 doi: 10.1109/ITME.2018.00166 – ident: 105_CR14 – ident: 105_CR8 doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195 – volume: 2016 start-page: 1 year: 2016 ident: 105_CR28 publication-title: SoutheastCon doi: 10.1109/SECON.2016.7506644 – volume: 7 start-page: 194 year: 2016 ident: 105_CR6 publication-title: Int J Comput Sci Technol – volume: 5 start-page: 137 year: 2010 ident: 105_CR15 publication-title: Int Conf Comput Appl Syst Model doi: 10.1109/ICCASM.2010.5619113 – volume: 72 start-page: 1740 year: 2014 ident: 105_CR4 publication-title: J Supercomput doi: 10.1007/s11227-014-1353-0 – ident: 105_CR19 doi: 10.14722/ndss.2015.23064 – ident: 105_CR23 – volume: 2 start-page: 555 year: 2009 ident: 105_CR16 publication-title: WRI World Congr Comput Sci Inf Eng doi: 10.1109/CSIE.2009.122 – ident: 105_CR21 doi: 10.1109/LCN.2016.83 – ident: 105_CR27 doi: 10.1109/ICATCCT.2015.7456999 – ident: 105_CR17 doi: 10.1109/SETIT.2012.6481988 – ident: 105_CR22 doi: 10.14569/IJACSA.2017.080474 – ident: 105_CR26 doi: 10.1109/ICACC.2015.66 – ident: 105_CR12 doi: 10.1109/ICDCSW.2007.19 – ident: 105_CR30 doi: 10.1145/2979779.2983928 – ident: 105_CR34 – ident: 105_CR32 – ident: 105_CR18 doi: 10.1109/LANOMS.2009.5338799 – volume: 8 start-page: 1095 year: 2019 ident: 105_CR25 publication-title: Electronics doi: 10.3390/electronics8101095 – volume: 13 start-page: 14823 year: 2018 ident: 105_CR11 publication-title: Int J Appl Eng Res – volume: 14 start-page: 187 year: 2010 ident: 105_CR33 publication-title: IEEE Commun Lett doi: 10.1109/LCOMM.2010.02.092108 – ident: 105_CR3 – volume: 51 start-page: 136 year: 2013 ident: 105_CR7 publication-title: IEEE Commun Mag doi: 10.1109/MCOM.2013.6461198  | 
    
| SSID | ssib031263793 ssj0002734763  | 
    
| Score | 2.138534 | 
    
| Snippet | Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution... | 
    
| SourceID | proquest crossref springer  | 
    
| SourceType | Aggregation Database Enrichment Source Index Database Publisher  | 
    
| StartPage | 58 | 
    
| SubjectTerms | Access control Algorithms Circuits and Systems Computer Hardware Cybersecurity Denial of service attacks Embedded systems Engineering Information Systems Applications (incl.Internet) Internet Protocol IP (Internet Protocol) Software-defined networking Spoofing Systems and Data Security Virtual environments Virtual networks  | 
    
| Title | E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures | 
    
| URI | https://link.springer.com/article/10.1007/s41635-020-00105-x https://www.proquest.com/docview/2932844412  | 
    
| Volume | 5 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 2509-3436 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002734763 issn: 2509-3428 databaseCode: AFBBN dateStart: 20170301 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2509-3436 dateEnd: 20241102 omitProxy: true ssIdentifier: ssj0002734763 issn: 2509-3428 databaseCode: BENPR dateStart: 20170301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest  | 
    
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1dS8MwFL3M7UUf_JiK0yl58E2L_f4QRDrdFMExnIJvJU3TMZF2bhXmv_cmJk4F91IKbfOQnNx7muSeA3Ac0UDEPQRvTsXSDTWNKA1dJHKuFVAWWmYmipPv-_7tk3v37D3XoK9rYcSxSh0TZaDOSibWyM8wLWEkxeRtX07eDOEaJXZXtYUGVdYK2YWUGFuBhi2UserQ6HT7gweNMMeyfUcj8kWJuwTSbg2pQGQ4SMZVZY2srxNsRRQwi-JrJCLG_Hf2WlDSP7uoMjn1NmFdsUoSf8FgC2q8aMKGdmwgagI3Ye2H_OA2pF27Q4d8cE66UkgC8w_p0A8-w-uMZ2SovO3IYFpWJSKGxCM6Rj5J4ocBGU5KBGYxInFViUJ9Mi7I8LpP4h9bE7MdeOp1H69uDeW5YDD8cZoboY8MzGRuHuEoMis1PRpRlptm6oZuaPrUQr7EeOoFPKS-y3IqMGAFnCGzChzP2YV6URZ8Dwi37Zzn3Az8gLkZtoD3yG58L0OSkIZWCyzdlwlTguTCF-M1-ZZSlv2fYP8nsv-TeQtOvr-ZfMlxLH27rYcoUVNzliyA1IJTPWyLx_-3tr-8tQNYtcV5F3k-rQ31avrOD5GwVOkRrIS9myOFxU8l-uNa | 
    
| linkProvider | ProQuest | 
    
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwEB5V9MDugeeutlBYH5YTG22SunkgVShdisqrqihI3LKO4yAQSgoJov1z_DbGrk3ZlZYblyhSEisZj2c-x57vA_gRMl_GPXTejMlfN8y2wiSgCOSo4zMeOHYqi5PPBl7_kh5fta9q8GxqYeS2ShMTVaBOCy7_kf_CtISRFJO3uz--t6RqlFxdNRIaTEsrpB1FMaYLO07E9AmncGXn6AD7e8d1D3sXv_uWVhmwOE4VJlbgIeawOc1CfG_uJHabhYxntp3QgAa2xxxECFwkbV8EzKM8Y_KrHV9wxBK-Uo3AFFCnLRri5K_e7Q2G58ajW47rtcwIuNVkMr6Sd0PoEVotBP-6kkfV80l0JAumZbE3Ah9r8ne2nEPgf1ZtVTI8XIEljWJJNHO7VaiJfA2WjUIE0QFjDT6_oTtch6TndtlIDPdITxFXYL4jXTYVJR5LkZKR1tIjw4eiKtBDSXTNbhC_kuh8SEbjAgdCfk2iqpLEAOQmJ6ODAYneLIWUX-DyQ6z_FRbyIhffgAjXzUQmbN_zOU2xBTxHNOW1UwQlSeA0wDG2jLkmQJc6HHfxK3Wzsn-M9o-V_eNJA3ZfnxnP6D_evbtpuijWoaCM547bgJ-m2-aX_9_axvutfYfF_sXZaXx6NDjZhE-u3Guj9sY1YaF6eBRbCJaqZFt7JIE_Hz0IXgBFOh-L | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=E2BaSeP%3A+Efficient+Bayes+Based+Security+Protocol+Against+ARP+Spoofing+Attacks+in+SDN+Architectures&rft.jtitle=Journal+of+hardware+and+systems+security&rft.au=Tchendji%2C+Vianney+Kengne&rft.au=Mvah%2C+Fabrice&rft.au=Djamegni%2C+Cl%C3%A9mentin+Tayou&rft.au=Yankam%2C+Yannick+Florian&rft.date=2021-03-01&rft.pub=Springer+Nature+B.V&rft.issn=2509-3428&rft.eissn=2509-3436&rft.volume=5&rft.issue=1&rft.spage=58&rft.epage=74&rft_id=info:doi/10.1007%2Fs41635-020-00105-x | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2509-3428&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2509-3428&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2509-3428&client=summon |