E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures

Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facil...

Full description

Saved in:
Bibliographic Details
Published inJournal of hardware and systems security Vol. 5; no. 1; pp. 58 - 74
Main Authors Tchendji, Vianney Kengne, Mvah, Fabrice, Djamegni, Clémentin Tayou, Yankam, Yannick Florian
Format Journal Article
LanguageEnglish
Published Cham Springer International Publishing 01.03.2021
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN2509-3428
2509-3436
DOI10.1007/s41635-020-00105-x

Cover

Abstract Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facilitating users’ impersonation and forged IP-MAC pair insertion into the victims’ ARP caches. This type of attack is the beginning of more dangerous attacks such as man-in-the-middle and denial-of-service. Several solutions based on SDN (Software-Defined Network) technology, known for their suitable adaptation to large-scale networks, have been proposed. These solutions use a global ARP cache built into the controller which contains the virtual machines’ IP-MAC pairs, as attacker detection knowledge. The main drawbacks of these methods are the collection and unsecured storage of IP-MAC pairs into the global ARP cache and failure to consider IP address reallocation cases, as well as users’ connection and reconnection scenarios in the attacker detection process. To remedy these shortcomings, we propose an Efficient Bayes Based Security Protocol (E2BaSeP) which detects attackers using a Bayes-based algorithm. This solution works in both dynamically and statically addressing networks. Simulation results show that the E2BaSeP protocol provides effective protection for ARP caches and performs better than those observed in the literature.
AbstractList Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution Protocol (ARP) vulnerabilities. Indeed, the ARP protocol can allow a virtual machine to be identified by one or more IP-MAC pairs, thus facilitating users’ impersonation and forged IP-MAC pair insertion into the victims’ ARP caches. This type of attack is the beginning of more dangerous attacks such as man-in-the-middle and denial-of-service. Several solutions based on SDN (Software-Defined Network) technology, known for their suitable adaptation to large-scale networks, have been proposed. These solutions use a global ARP cache built into the controller which contains the virtual machines’ IP-MAC pairs, as attacker detection knowledge. The main drawbacks of these methods are the collection and unsecured storage of IP-MAC pairs into the global ARP cache and failure to consider IP address reallocation cases, as well as users’ connection and reconnection scenarios in the attacker detection process. To remedy these shortcomings, we propose an Efficient Bayes Based Security Protocol (E2BaSeP) which detects attackers using a Bayes-based algorithm. This solution works in both dynamically and statically addressing networks. Simulation results show that the E2BaSeP protocol provides effective protection for ARP caches and performs better than those observed in the literature.
Author Tchendji, Vianney Kengne
Mvah, Fabrice
Yankam, Yannick Florian
Djamegni, Clémentin Tayou
Author_xml – sequence: 1
  givenname: Vianney Kengne
  orcidid: 0000-0003-3836-1859
  surname: Tchendji
  fullname: Tchendji, Vianney Kengne
  email: vianneykengne@yahoo.fr
  organization: Department of Mathematics and Computer Science, University of Dschang
– sequence: 2
  givenname: Fabrice
  surname: Mvah
  fullname: Mvah, Fabrice
  organization: Department of Mathematics and Computer Science, University of Dschang
– sequence: 3
  givenname: Clémentin Tayou
  surname: Djamegni
  fullname: Djamegni, Clémentin Tayou
  organization: Department of Mathematics and Computer Science, University of Dschang, Department of Computer Engineering, University of Dschang
– sequence: 4
  givenname: Yannick Florian
  surname: Yankam
  fullname: Yankam, Yannick Florian
  organization: Department of Mathematics and Computer Science, University of Dschang
BookMark eNp9kE1LAzEQhoMoWGv_gKeA59V8bXbX27bWDyharJ5DdszWaE1qkkL7712tKHjoZWYO7zMzPEdo33lnEDqh5IwSUpxHQSXPM8JIRgglebbeQz2Wkyrjgsv935mVh2gQo20Ip0zyouI91IzZUM_M9AKP29aCNS7hod6Y2NVonvHMwCrYtMHT4JMHv8D1XFsXE64fpni29L61bo7rlDS8RWwdnl3e4TrAi00G0iqYeIwOWr2IZvDT--jpavw4uskm99e3o3qSAZVinZUyp5SAaKtKF0AbkutKQ0tII0pREqmpZBxMkxem1FJAqw2ApoUBJkXBc95Hp9u9y-A_ViYm9epXwXUnFas4K4UQlHUptk1B8DEG06plsO86bBQl6kun2upUnU71rVOtO6j8B4FNOlnvUtB2sRvlWzR2d9zchL-vdlCfOg6LLA
CitedBy_id crossref_primary_10_1016_j_cose_2023_103696
crossref_primary_10_1007_s11277_025_11748_w
crossref_primary_10_1109_TDSC_2022_3162312
crossref_primary_10_3390_electronics12143077
crossref_primary_10_1109_ACCESS_2022_3172329
crossref_primary_10_1007_s10207_023_00749_0
Cites_doi 10.1109/SIET.2018.8693155
10.1109/ICCTA37466.2015.9513433
10.35940/ijeat.B3801.129219
10.1109/ICC.2007.228
10.1109/ECTICON.2009.5137193
10.1109/JPROC.2014.2371999
10.1109/ICOIN.2019.8718158
10.1109/ITME.2018.00166
10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195
10.1109/SECON.2016.7506644
10.1109/ICCASM.2010.5619113
10.1007/s11227-014-1353-0
10.14722/ndss.2015.23064
10.1109/CSIE.2009.122
10.1109/LCN.2016.83
10.1109/ICATCCT.2015.7456999
10.1109/SETIT.2012.6481988
10.14569/IJACSA.2017.080474
10.1109/ICACC.2015.66
10.1109/ICDCSW.2007.19
10.1145/2979779.2983928
10.1109/LANOMS.2009.5338799
10.3390/electronics8101095
10.1109/LCOMM.2010.02.092108
10.1109/MCOM.2013.6461198
ContentType Journal Article
Copyright Springer Nature Switzerland AG 2020
Springer Nature Switzerland AG 2020.
Copyright_xml – notice: Springer Nature Switzerland AG 2020
– notice: Springer Nature Switzerland AG 2020.
DBID AAYXX
CITATION
8FE
8FG
ABJCF
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
L6V
M7S
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
DOI 10.1007/s41635-020-00105-x
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central UK/Ireland
Advanced Technologies & Computer Science Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection (via ProQuest SciTech Premium Collection)
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection (via ProQuest)
ProQuest Computer Science Collection
Computer Science Database (Proquest)
ProQuest Engineering Collection
Engineering Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering Collection
DatabaseTitle CrossRef
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Advanced Technologies & Aerospace Collection
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList
Computer Science Database
Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2509-3436
EndPage 74
ExternalDocumentID 10_1007_s41635_020_00105_x
GroupedDBID -EM
0R~
406
AACDK
AAHNG
AAIAL
AAJBT
AANZL
AARHV
AASML
AATNV
AATVU
AAUYE
AAYUE
ABAKF
ABDZT
ABECU
ABFTV
ABJCF
ABJNI
ABJOX
ABKCH
ABMQK
ABQBU
ABTEG
ABTKH
ABTMW
ABXPI
ACAOD
ACDTI
ACGFS
ACHSB
ACMLO
ACOKC
ACPIV
ACZOJ
ADHHG
ADKNI
ADKPE
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEJRE
AEMSY
AEOHA
AESKC
AEVLU
AEXYK
AFBBN
AFKRA
AFQWF
AGDGC
AGMZJ
AGQEE
AGRTI
AHKAY
AHSBF
AIAKS
AIGIU
AILAN
AITGF
AJRNO
AJZVZ
ALFXC
ALMA_UNASSIGNED_HOLDINGS
AMKLP
AMXSW
AMYLF
AMYQR
ARAPS
AXYYD
BENPR
BGLVJ
BGNMA
CCPQU
CSCUP
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
FERAY
FIGPU
FINBP
FNLPD
FSGXE
GGCAI
GJIRD
H13
HCIFZ
IKXTQ
IWAJR
J-C
JZLTJ
K7-
KOV
LLZTM
M4Y
M7S
NPVJJ
NQJWS
NU0
O9J
PT4
PTHSS
RLLFE
ROL
RSV
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
TSG
UOJIU
UTJUX
UZXMN
VFIZW
Z7R
Z7X
Z88
ZMTXR
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
AEZWR
AFDZB
AFHIU
AFOHR
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PUEGO
8FE
8FG
AZQEC
DWQXO
GNUQQ
JQ2
L6V
P62
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
ID FETCH-LOGICAL-c164x-865110c4f99a7c1b05a9acf00b484806a1623ceb57e8a64cfaecca17ec2647353
IEDL.DBID BENPR
ISSN 2509-3428
IngestDate Fri Jul 25 10:56:51 EDT 2025
Wed Oct 01 04:31:22 EDT 2025
Thu Apr 24 23:08:20 EDT 2025
Fri Feb 21 02:50:02 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Dynamic addressing
Bayes probabilities
Software-defined network
Global ARP cache
ARP spoofing
Virtual networks
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c164x-865110c4f99a7c1b05a9acf00b484806a1623ceb57e8a64cfaecca17ec2647353
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-3836-1859
PQID 2932844412
PQPubID 6623297
PageCount 17
ParticipantIDs proquest_journals_2932844412
crossref_primary_10_1007_s41635_020_00105_x
crossref_citationtrail_10_1007_s41635_020_00105_x
springer_journals_10_1007_s41635_020_00105_x
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210300
2021-03-00
20210301
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 3
  year: 2021
  text: 20210300
PublicationDecade 2020
PublicationPlace Cham
PublicationPlace_xml – name: Cham
– name: Gainesville
PublicationTitle Journal of hardware and systems security
PublicationTitleAbbrev J Hardw Syst Secur
PublicationYear 2021
Publisher Springer International Publishing
Springer Nature B.V
Publisher_xml – name: Springer International Publishing
– name: Springer Nature B.V
References Trabelsi Z, El-Hajj W (2007) Preventing ARP attacks using a fuzzy-based stateful ARP cache. In: 2007 IEEE international conference on communications, pp 1355–1360. https://doi.org/10.1109/ICC.2007.228
Sahoo SK, Mishra KS, Sahoo S, Sahoo B (2017) Software defined network: the next generation Internet technology
Fahad U, Rashid A, Faisal B, Muhammad M (2017) Mitigating address spoofing attacks in hybrid SDN. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2017.080474
MoonDLeeJDJeongYSParkJHRTNSS: A routing trace-based network security system for preventing ARP spoofing attacksJ Supercomput2014721740175610.1007/s11227-014-1353-010.1007/s11227-014-1353-0
NamYSKimDKimJEnhanced ARP: preventing ARP poisoning-based man-in-the-middle attacksIEEE Commun Lett20101418718910.1109/LCOMM.2010.02.09210810.1109/LCOMM.2010.02.092108
Ma H, Ding H, Yang Y, Mi Z, Zhang M (2015) SDN-based ARP attack detection for cloud centers. In: 2015 IEEE 12th intl conf on ubiquitous intelligence and computing and 2015 IEEE 12th intl conf on autonomic and trusted computing and IEEE 15th intl conf on scalable computing and communications and its associated workshops (UIC-ATC-ScalCom), Beijing. vol 00 pp 1049–1054. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195
Kim Y, Ahn S, Thang CN, Choi D, Park M (2019) ARP Poisoning attack detection based on ARP update state in software-defined networks. In: 2019 International conference on information networking (ICOIN), pp 366–371. https://doi.org/10.1109/ICOIN.2019.8718158
Shukla S, Yadav I (2015) An innovative method for detection and prevention against ARP spoofing in MANET. International Journal of Computer Science and Information Technology and Security (IJCSITS)
CoxHJClarkJROwenLHLeveraging SDN for ARP securitySoutheastCon201620161810.1109/SECON.2016.7506644
Abad LC, Bonilla IR (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: 27th International conference on distributed computing systems workshops (ICDCSW’07), pp 60–60. https://doi.org/10.1109/ICDCSW.2007.19
Plummer CD (1982) An ethernet address resolution protocol. INTERNET STANDARD. https://tools.ietf.org/html/rfc826.Accessed08January2020
Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP spoof problem. In: 2009 6th International conference on electrical engineering/electronics, computer telecommunications and information technology, vol 02, pp 910–913. https://doi.org/10.1109/ECTICON.2009.5137193
HouXJiangZTianXThe detection and prevention for ARP spoofing based on snortInt Conf Comput Appl Syst Model2010513713910.1109/ICCASM.2010.5619113
ChauhanAYadavKRDetection of MAC spoofing using SVM techniqueInt J Comput Sci Technol20167194197
Lallo R, Lospoto G, Rimondini M, Battista G (2016) How to handle ARP in a software-defined network
ZawarSSteveCMitigating ARP cache poisoning attack in software-defined networking (SDN): a surveyElectronics20198109510.3390/electronics8101095
Ortega PA, Marcos EX, Chiang DL, Abad LC (2009) Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin american network operations and management symposium, LANOMS 2009, Punta del Este, Uruguay, October 19-21, 2009, Proceedings. https://doi.org/10.1109/LANOMS.2009.5338799
Oliveira SLR, Schweitzer MC, Shinoda AA, Prete RL (2014) Using Mininet for emulation and prototyping Software-Defined Networks
Data M (2018) The defense against ARP spoofing attack using semi-static ARP cache table. In: 2018 International conference on sustainable information engineering and technology (SIET), pp 206–210. https://doi.org/10.1109/SIET.2018.8693155
Loriya TH, Kulshreshta A, Keraliya RD (2017) Security analysis of various public key cryptosystems for authentication and key agreement in wireless communication network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
Mohan D, Rishabh P, Kshiteej M, Vijay M (2015) SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February pp 8–11. https://doi.org/10.14722/ndss.2015.23064
YeganehHSTootoonchianAGanjaliYOn scalability of software-defined networkingIEEE Commun Mag20135113614110.1109/MCOM.2013.646119810.1109/MCOM.2013.6461198
Gao W, Sun Y, Fu Q, Wu Z, Ma X, Zheng K, Huang X (2018) ARP poisoning prevention in Internet of Things. IEEE Communications Letters, 733–736, International Conference on Information Technology in Medicine and Education (ITME)
Jehan N, Haneef MA (2015) Scalable ethernet architecture using SDN by suppressing broadcast traffic. In: 2015 Fifth international conference on advances in computing and communications (ICACC), pp 24–27. https://doi.org/10.1109/ICACC.2015.66
Balagopal D, Rani KAX (2015) NetWatch: Empowering software-defined network switches for packet filtering. In: 2015 International conference on applied and theoretical computing and communication technology (iCATccT), pp 837–840. https://doi.org/10.1109/ICATCCT.2015.7456999
Sagar KS, Sagarika M, Mayank T, Kishore BM, Bibhudatta S (2019) A comprehensive tutorial on software defined network: The driving force for the future internet technology. In: Proceedings of the international conference on advances in information communication technology and computing New York, NY, USA. https://doi.org/10.1145/2979779.2983928
Abdelsalam MA, Ashraf E, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: Conference: ICCTA 2015, At Alexandria, Egypt
Divya C, Christopher XFD (2019) SM-ARP: stochastic Markovian game model for packet forwarding based ARP spoofing attacks detection. International Journal of Engineering and Advanced Technology (IJEAT)
Boughrara A, Mammar S (2012) Implementation of a SNORT’s output Plug-In in reaction to ARP Spoofing’s attack. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT), pp 643–647. https://doi.org/10.1109/SETIT.2012.6481988
DivyaCChristopherXFDSecurity against ARP spoofing attacks using Bayesian support vector regressionInt J Innov Tech Explor Eng (IJITEE)2019822783075
Alharbi T, Durando D, Pakzad F, Portmann M (2016) Securing ARP in software defined networks. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 523-526. https://doi.org/10.1109/LCN.2016.83
QianAThe automatic prevention and control research of ARP deception and implementationWRI World Congr Comput Sci Inf Eng2009255555810.1109/CSIE.2009.122
BalagopalDRaniXAKA technique for a software-defined and network-based ARP spoof detection and mitigationInt J Appl Eng Res2018131482314826
KreutzDRamosVMFVeríssimoEPRothenbergECAzodolmolkySUhligSSoftware-defined networking: a comprehensive surveyProc IEEE2015103147610.1109/JPROC.2014.237199910.1109/JPROC.2014.2371999
HJ Cox (105_CR28) 2016; 2016
105_CR1
105_CR3
105_CR2
105_CR5
YS Nam (105_CR33) 2010; 14
HS Yeganeh (105_CR7) 2013; 51
105_CR19
105_CR29
105_CR27
105_CR26
105_CR24
105_CR23
105_CR22
105_CR21
105_CR20
A Chauhan (105_CR6) 2016; 7
D Moon (105_CR4) 2014; 72
S Zawar (105_CR25) 2019; 8
X Hou (105_CR15) 2010; 5
105_CR18
105_CR8
105_CR17
D Balagopal (105_CR11) 2018; 13
D Kreutz (105_CR31) 2015; 103
C Divya (105_CR9) 2019; 8
105_CR14
105_CR13
105_CR12
105_CR34
105_CR10
105_CR32
A Qian (105_CR16) 2009; 2
105_CR30
References_xml – reference: Plummer CD (1982) An ethernet address resolution protocol. INTERNET STANDARD. https://tools.ietf.org/html/rfc826.Accessed08January2020
– reference: Jehan N, Haneef MA (2015) Scalable ethernet architecture using SDN by suppressing broadcast traffic. In: 2015 Fifth international conference on advances in computing and communications (ICACC), pp 24–27. https://doi.org/10.1109/ICACC.2015.66
– reference: QianAThe automatic prevention and control research of ARP deception and implementationWRI World Congr Comput Sci Inf Eng2009255555810.1109/CSIE.2009.122
– reference: Ma H, Ding H, Yang Y, Mi Z, Zhang M (2015) SDN-based ARP attack detection for cloud centers. In: 2015 IEEE 12th intl conf on ubiquitous intelligence and computing and 2015 IEEE 12th intl conf on autonomic and trusted computing and IEEE 15th intl conf on scalable computing and communications and its associated workshops (UIC-ATC-ScalCom), Beijing. vol 00 pp 1049–1054. https://doi.org/10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195
– reference: Loriya TH, Kulshreshta A, Keraliya RD (2017) Security analysis of various public key cryptosystems for authentication and key agreement in wireless communication network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)
– reference: Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP spoof problem. In: 2009 6th International conference on electrical engineering/electronics, computer telecommunications and information technology, vol 02, pp 910–913. https://doi.org/10.1109/ECTICON.2009.5137193
– reference: Alharbi T, Durando D, Pakzad F, Portmann M (2016) Securing ARP in software defined networks. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 523-526. https://doi.org/10.1109/LCN.2016.83
– reference: Mohan D, Rishabh P, Kshiteej M, Vijay M (2015) SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February pp 8–11. https://doi.org/10.14722/ndss.2015.23064
– reference: Gao W, Sun Y, Fu Q, Wu Z, Ma X, Zheng K, Huang X (2018) ARP poisoning prevention in Internet of Things. IEEE Communications Letters, 733–736, International Conference on Information Technology in Medicine and Education (ITME)
– reference: Sahoo SK, Mishra KS, Sahoo S, Sahoo B (2017) Software defined network: the next generation Internet technology
– reference: NamYSKimDKimJEnhanced ARP: preventing ARP poisoning-based man-in-the-middle attacksIEEE Commun Lett20101418718910.1109/LCOMM.2010.02.09210810.1109/LCOMM.2010.02.092108
– reference: Trabelsi Z, El-Hajj W (2007) Preventing ARP attacks using a fuzzy-based stateful ARP cache. In: 2007 IEEE international conference on communications, pp 1355–1360. https://doi.org/10.1109/ICC.2007.228
– reference: ChauhanAYadavKRDetection of MAC spoofing using SVM techniqueInt J Comput Sci Technol20167194197
– reference: ZawarSSteveCMitigating ARP cache poisoning attack in software-defined networking (SDN): a surveyElectronics20198109510.3390/electronics8101095
– reference: HouXJiangZTianXThe detection and prevention for ARP spoofing based on snortInt Conf Comput Appl Syst Model2010513713910.1109/ICCASM.2010.5619113
– reference: Boughrara A, Mammar S (2012) Implementation of a SNORT’s output Plug-In in reaction to ARP Spoofing’s attack. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT), pp 643–647. https://doi.org/10.1109/SETIT.2012.6481988
– reference: KreutzDRamosVMFVeríssimoEPRothenbergECAzodolmolkySUhligSSoftware-defined networking: a comprehensive surveyProc IEEE2015103147610.1109/JPROC.2014.237199910.1109/JPROC.2014.2371999
– reference: Data M (2018) The defense against ARP spoofing attack using semi-static ARP cache table. In: 2018 International conference on sustainable information engineering and technology (SIET), pp 206–210. https://doi.org/10.1109/SIET.2018.8693155
– reference: CoxHJClarkJROwenLHLeveraging SDN for ARP securitySoutheastCon201620161810.1109/SECON.2016.7506644
– reference: BalagopalDRaniXAKA technique for a software-defined and network-based ARP spoof detection and mitigationInt J Appl Eng Res2018131482314826
– reference: Oliveira SLR, Schweitzer MC, Shinoda AA, Prete RL (2014) Using Mininet for emulation and prototyping Software-Defined Networks
– reference: Ortega PA, Marcos EX, Chiang DL, Abad LC (2009) Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin american network operations and management symposium, LANOMS 2009, Punta del Este, Uruguay, October 19-21, 2009, Proceedings. https://doi.org/10.1109/LANOMS.2009.5338799
– reference: Fahad U, Rashid A, Faisal B, Muhammad M (2017) Mitigating address spoofing attacks in hybrid SDN. International Journal of Advanced Computer Science and Applications. https://doi.org/10.14569/IJACSA.2017.080474
– reference: Divya C, Christopher XFD (2019) SM-ARP: stochastic Markovian game model for packet forwarding based ARP spoofing attacks detection. International Journal of Engineering and Advanced Technology (IJEAT)
– reference: Shukla S, Yadav I (2015) An innovative method for detection and prevention against ARP spoofing in MANET. International Journal of Computer Science and Information Technology and Security (IJCSITS)
– reference: Balagopal D, Rani KAX (2015) NetWatch: Empowering software-defined network switches for packet filtering. In: 2015 International conference on applied and theoretical computing and communication technology (iCATccT), pp 837–840. https://doi.org/10.1109/ICATCCT.2015.7456999
– reference: YeganehHSTootoonchianAGanjaliYOn scalability of software-defined networkingIEEE Commun Mag20135113614110.1109/MCOM.2013.646119810.1109/MCOM.2013.6461198
– reference: MoonDLeeJDJeongYSParkJHRTNSS: A routing trace-based network security system for preventing ARP spoofing attacksJ Supercomput2014721740175610.1007/s11227-014-1353-010.1007/s11227-014-1353-0
– reference: Kim Y, Ahn S, Thang CN, Choi D, Park M (2019) ARP Poisoning attack detection based on ARP update state in software-defined networks. In: 2019 International conference on information networking (ICOIN), pp 366–371. https://doi.org/10.1109/ICOIN.2019.8718158
– reference: Abad LC, Bonilla IR (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: 27th International conference on distributed computing systems workshops (ICDCSW’07), pp 60–60. https://doi.org/10.1109/ICDCSW.2007.19
– reference: DivyaCChristopherXFDSecurity against ARP spoofing attacks using Bayesian support vector regressionInt J Innov Tech Explor Eng (IJITEE)2019822783075
– reference: Abdelsalam MA, Ashraf E, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: Conference: ICCTA 2015, At Alexandria, Egypt
– reference: Sagar KS, Sagarika M, Mayank T, Kishore BM, Bibhudatta S (2019) A comprehensive tutorial on software defined network: The driving force for the future internet technology. In: Proceedings of the international conference on advances in information communication technology and computing New York, NY, USA. https://doi.org/10.1145/2979779.2983928
– reference: Lallo R, Lospoto G, Rimondini M, Battista G (2016) How to handle ARP in a software-defined network
– ident: 105_CR10
  doi: 10.1109/SIET.2018.8693155
– ident: 105_CR20
  doi: 10.1109/ICCTA37466.2015.9513433
– ident: 105_CR1
  doi: 10.35940/ijeat.B3801.129219
– ident: 105_CR5
  doi: 10.1109/ICC.2007.228
– ident: 105_CR24
– volume: 8
  start-page: 2278
  year: 2019
  ident: 105_CR9
  publication-title: Int J Innov Tech Explor Eng (IJITEE)
– ident: 105_CR13
  doi: 10.1109/ECTICON.2009.5137193
– volume: 103
  start-page: 14
  year: 2015
  ident: 105_CR31
  publication-title: Proc IEEE
  doi: 10.1109/JPROC.2014.2371999
– ident: 105_CR29
  doi: 10.1109/ICOIN.2019.8718158
– ident: 105_CR2
  doi: 10.1109/ITME.2018.00166
– ident: 105_CR14
– ident: 105_CR8
  doi: 10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.195
– volume: 2016
  start-page: 1
  year: 2016
  ident: 105_CR28
  publication-title: SoutheastCon
  doi: 10.1109/SECON.2016.7506644
– volume: 7
  start-page: 194
  year: 2016
  ident: 105_CR6
  publication-title: Int J Comput Sci Technol
– volume: 5
  start-page: 137
  year: 2010
  ident: 105_CR15
  publication-title: Int Conf Comput Appl Syst Model
  doi: 10.1109/ICCASM.2010.5619113
– volume: 72
  start-page: 1740
  year: 2014
  ident: 105_CR4
  publication-title: J Supercomput
  doi: 10.1007/s11227-014-1353-0
– ident: 105_CR19
  doi: 10.14722/ndss.2015.23064
– ident: 105_CR23
– volume: 2
  start-page: 555
  year: 2009
  ident: 105_CR16
  publication-title: WRI World Congr Comput Sci Inf Eng
  doi: 10.1109/CSIE.2009.122
– ident: 105_CR21
  doi: 10.1109/LCN.2016.83
– ident: 105_CR27
  doi: 10.1109/ICATCCT.2015.7456999
– ident: 105_CR17
  doi: 10.1109/SETIT.2012.6481988
– ident: 105_CR22
  doi: 10.14569/IJACSA.2017.080474
– ident: 105_CR26
  doi: 10.1109/ICACC.2015.66
– ident: 105_CR12
  doi: 10.1109/ICDCSW.2007.19
– ident: 105_CR30
  doi: 10.1145/2979779.2983928
– ident: 105_CR34
– ident: 105_CR32
– ident: 105_CR18
  doi: 10.1109/LANOMS.2009.5338799
– volume: 8
  start-page: 1095
  year: 2019
  ident: 105_CR25
  publication-title: Electronics
  doi: 10.3390/electronics8101095
– volume: 13
  start-page: 14823
  year: 2018
  ident: 105_CR11
  publication-title: Int J Appl Eng Res
– volume: 14
  start-page: 187
  year: 2010
  ident: 105_CR33
  publication-title: IEEE Commun Lett
  doi: 10.1109/LCOMM.2010.02.092108
– ident: 105_CR3
– volume: 51
  start-page: 136
  year: 2013
  ident: 105_CR7
  publication-title: IEEE Commun Mag
  doi: 10.1109/MCOM.2013.6461198
SSID ssib031263793
ssj0002734763
Score 2.138534
Snippet Virtual networks, just like classical IP networks, usually face many external threats such as ARP spoofing attacks. These attacks come from Address Resolution...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 58
SubjectTerms Access control
Algorithms
Circuits and Systems
Computer Hardware
Cybersecurity
Denial of service attacks
Embedded systems
Engineering
Information Systems Applications (incl.Internet)
Internet Protocol
IP (Internet Protocol)
Software-defined networking
Spoofing
Systems and Data Security
Virtual environments
Virtual networks
Title E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures
URI https://link.springer.com/article/10.1007/s41635-020-00105-x
https://www.proquest.com/docview/2932844412
Volume 5
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVLSH
  databaseName: SpringerLink Journals
  customDbUrl:
  mediaType: online
  eissn: 2509-3436
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002734763
  issn: 2509-3428
  databaseCode: AFBBN
  dateStart: 20170301
  isFulltext: true
  providerName: Library Specific Holdings
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl: http://www.proquest.com/pqcentral?accountid=15518
  eissn: 2509-3436
  dateEnd: 20241102
  omitProxy: true
  ssIdentifier: ssj0002734763
  issn: 2509-3428
  databaseCode: BENPR
  dateStart: 20170301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1dS8MwFL3M7UUf_JiK0yl58E2L_f4QRDrdFMExnIJvJU3TMZF2bhXmv_cmJk4F91IKbfOQnNx7muSeA3Ac0UDEPQRvTsXSDTWNKA1dJHKuFVAWWmYmipPv-_7tk3v37D3XoK9rYcSxSh0TZaDOSibWyM8wLWEkxeRtX07eDOEaJXZXtYUGVdYK2YWUGFuBhi2UserQ6HT7gweNMMeyfUcj8kWJuwTSbg2pQGQ4SMZVZY2srxNsRRQwi-JrJCLG_Hf2WlDSP7uoMjn1NmFdsUoSf8FgC2q8aMKGdmwgagI3Ye2H_OA2pF27Q4d8cE66UkgC8w_p0A8-w-uMZ2SovO3IYFpWJSKGxCM6Rj5J4ocBGU5KBGYxInFViUJ9Mi7I8LpP4h9bE7MdeOp1H69uDeW5YDD8cZoboY8MzGRuHuEoMis1PRpRlptm6oZuaPrUQr7EeOoFPKS-y3IqMGAFnCGzChzP2YV6URZ8Dwi37Zzn3Az8gLkZtoD3yG58L0OSkIZWCyzdlwlTguTCF-M1-ZZSlv2fYP8nsv-TeQtOvr-ZfMlxLH27rYcoUVNzliyA1IJTPWyLx_-3tr-8tQNYtcV5F3k-rQ31avrOD5GwVOkRrIS9myOFxU8l-uNa
linkProvider ProQuest
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwEB5V9MDugeeutlBYH5YTG22SunkgVShdisqrqihI3LKO4yAQSgoJov1z_DbGrk3ZlZYblyhSEisZj2c-x57vA_gRMl_GPXTejMlfN8y2wiSgCOSo4zMeOHYqi5PPBl7_kh5fta9q8GxqYeS2ShMTVaBOCy7_kf_CtISRFJO3uz--t6RqlFxdNRIaTEsrpB1FMaYLO07E9AmncGXn6AD7e8d1D3sXv_uWVhmwOE4VJlbgIeawOc1CfG_uJHabhYxntp3QgAa2xxxECFwkbV8EzKM8Y_KrHV9wxBK-Uo3AFFCnLRri5K_e7Q2G58ajW47rtcwIuNVkMr6Sd0PoEVotBP-6kkfV80l0JAumZbE3Ah9r8ne2nEPgf1ZtVTI8XIEljWJJNHO7VaiJfA2WjUIE0QFjDT6_oTtch6TndtlIDPdITxFXYL4jXTYVJR5LkZKR1tIjw4eiKtBDSXTNbhC_kuh8SEbjAgdCfk2iqpLEAOQmJ6ODAYneLIWUX-DyQ6z_FRbyIhffgAjXzUQmbN_zOU2xBTxHNOW1UwQlSeA0wDG2jLkmQJc6HHfxK3Wzsn-M9o-V_eNJA3ZfnxnP6D_evbtpuijWoaCM547bgJ-m2-aX_9_axvutfYfF_sXZaXx6NDjZhE-u3Guj9sY1YaF6eBRbCJaqZFt7JIE_Hz0IXgBFOh-L
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=E2BaSeP%3A+Efficient+Bayes+Based+Security+Protocol+Against+ARP+Spoofing+Attacks+in+SDN+Architectures&rft.jtitle=Journal+of+hardware+and+systems+security&rft.au=Tchendji%2C+Vianney+Kengne&rft.au=Mvah%2C+Fabrice&rft.au=Djamegni%2C+Cl%C3%A9mentin+Tayou&rft.au=Yankam%2C+Yannick+Florian&rft.date=2021-03-01&rft.pub=Springer+Nature+B.V&rft.issn=2509-3428&rft.eissn=2509-3436&rft.volume=5&rft.issue=1&rft.spage=58&rft.epage=74&rft_id=info:doi/10.1007%2Fs41635-020-00105-x
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2509-3428&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2509-3428&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2509-3428&client=summon