Open Access

Security Solution for ARP Cache Poisoning Attacks in Large Data Centre Networks


Cite

1. Laney, D. 3D Data Management: Controlling Data Volume, Velocity and Variety. - Gartner. Issued: 6 February 2001, accessed December 2015. http://blogs.gartner.com/doug-laney/files/2012/01/ad949-3D-Data-Management-Controlling-Data-Volume-Velocity-and-Variety.pdfSearch in Google Scholar

2. Damiani, E., C. A. Ardagn, F. Zavatarelli, E. Rekleitis, L. Marino s. Big Data Threat Landscape and Good Practice Guide. European Union Agency for Network and Information Security (ENISA), January 2016.Search in Google Scholar

3. Jeyanthi, N., N. S. N. Iyengar, C. S. N. Iyenga r. Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDo S Attacks in Cloud Computing Environment. - Cybernetics and Information Technologies, Vol. 13, 2013, No 1, pp. 46-60.10.2478/cait-2013-0005Search in Google Scholar

4. Thandeeswaran, R., S. Subhashini, N. Jeyanthi, M. A. S. Durai. Secured Multi-Cloud Virtual Infrastructure with Improved Performance. - Cybernetics and Information Technologies, Vol. 12, 2012, No 2, pp. 11-22.10.2478/cait-2012-0009Open DOISearch in Google Scholar

5. Narten, T., M. Karir, I. Foo. Address Resolution Problems in Large Data Center Networks.No RFC 6820, 2013. 10.17487/rfc6820Search in Google Scholar

6. Prabadevi, B., N. Jeyanthi. A Framework to Mitigate ARP Sniffing Attacks by Cache Poisoning. - International Journal of Advanced Intelligence Paradigms, 2016 (in Press).Search in Google Scholar

7. Jeyanthi, N., M. P. C. Kumar. A Virtual Firewall Mechanism Using Army Nodes to Protect Cloud Infrastructure from DDo S Attacks. - Cybernetics and Information Technologies, Vol. 14, 2014, No 3, pp. 71-85.10.2478/cait-2014-0034Open DOISearch in Google Scholar

8. Jeyanthi, N., R. Thandeeswaran, J. Vinithra. RQA Based Approach to Detect and Prevent DDo S Attacks in Vo IP Networks. - Cybernetics and Information Technologies, Vol. 14, 2014, No 1, pp. 11-24.10.2478/cait-2014-0002Search in Google Scholar

9. Dineen, T. Broadcast Storm Mitigation on Ethernet Networks. - Industrial Commuication, Schneider Electric Industries SAS. White paper. http://tinyurl.com/jq9l3n6.Search in Google Scholar

10. Greenberg, A., J. R. Hamilton, N. Jain, S. Kandula, C. Kim, P. Lahiri, D. A. Maltz, P. Patel, S. Sengupta. VL2: A Scalable and Flexible Data Center Network. - ACM SIGCOMM Computer Communication Review, Vol. 39, 2009, No 4.10.1145/1594977.1592576Search in Google Scholar

11. Greenberg, A., P. Lahiri, D. A. Maltz, P. Patel, S. Sengupta. Towardsa Next Generation Data Center Architecture: Scalability and Commoditization. - In: Proc. of ACM Workshop on Programmable Routers for Extensible Services of Tomorrow, ACM, 2008, pp. 57-62.Search in Google Scholar

12. Mysore, N., R. A. Pamboris, N. Farrington, N. Huang, P. Miri, S. Radhakrishnan, V. Subramanya, A. Vahdat. Portland: A Scalable Fault- Tolerant Layer 2 Data Center Network Fabric. - ACM, SIGCOMM Computer Communication Review, Vol. 39, 2009, No 4, pp. 39-50.10.1145/1594977.1592575Search in Google Scholar

13. Joe, T., R. Perlma n. Transparent Interconnection of Lots of Links (TRILL): Problem and Applicability Statement. No RFC 5556, 2009.Search in Google Scholar

14. Kim, M. C. C., J. Rexfor d. Floodless in SEATTLE: A Scalable Ethernet Architecture for Large Enterprises. - In: Proc. of ACM SIGCOMM Conference on Data communication (SIGCOMM’08), 2008.Search in Google Scholar

15. Umar, K., M. K. Gardner, E. J. Brown, W.-C. Feng. Seamless Migration of Virtual Machines Across Networks. - In: 22nd International Conference on Computer Communication and Networks (ICCCN’13), IEEE, 2013, pp. 1-7.Search in Google Scholar

16. Mauricio, A., M. Portolan i. Data-Center Network Architecture. U.S. Patent 7,643,468, Issued 5 January 2010.Search in Google Scholar

17. Prabadevi, B., N. Jeyanthi. A Mitigation System for ARP Cache Poisoning Attacks. - In: ICC-ACM 2nd International Conference on Internet of Things Data, and Cloud Computing, Churchill, 2017 (Accepted).10.1145/3018896.3018915Search in Google Scholar

18. Khandelwal, A., N. Jain, S. Kamara. Attacking Data Center Networks from the Inside. EECS. https://people.eecs.berkeley.edu/~anuragk/papers/dcn.pdfSearch in Google Scholar

19. Ma, H., H. Ding, Y. Yang, Z. Mi, J. Y. Yang, Z. Xiong. Bayes-Based ARP Attack Detection Algorithm for Cloud Centers. - Tsinghua Science and Technology, Vol. 21, 2016, No 1, pp. 17-28.10.1109/TST.2016.7399280Search in Google Scholar

20. Lootah, W., W. Enck, P. Mc Daniel. Tarp: Ticket-Based Address Resolution Protocol. - Computer Networks, Vol. 51, 2007, No 15, pp. 4322-4337.10.1016/j.comnet.2007.05.007Search in Google Scholar

21. Dessouky, M. M., W., Elkilany, N. Alfishaw y. A Hardware Approach for Detecting the ARP Attack, in Informatics and Systems (INFOS). - In: Proc. of 7th International Conference on Informatics and Systems, Cairo, Egypt, 2010, pp. 1-8.10.21608/mjeer.2010.66506Search in Google Scholar

22. Bruschi, D., A. Ornaghi, E. Rosti. S-Arp: A Secure Address Resolution Protocol. - In: Proc. of 19th Annual, Computer Security Applications Conference, 2003, pp. 66-74.Search in Google Scholar

23. Nam, S. Y., D. Kim, J. Kim. Enhanced Arp: Preventing Arp Poisoning-Based Man-in-the- Middle Attacks. - Communications Letters, IEEE, Vol. 14, 2010, No 2, pp. 187-189.10.1109/LCOMM.2010.02.092108Open DOISearch in Google Scholar

24. Kumar, S., S. Tapasw i. A Centralized Detection and Prevention Technique Against Arp Poisoning. - In: International Conference on Cyber Security, Cyber Warfare and Digital Forensic (Cyber Sec’12), Kuala Lumpur, Malaysia, 2012, pp. 259-264.10.1109/CyberSec.2012.6246087Search in Google Scholar

25. Neminath, H., S. Biswas, S. Roopa, R. Ratti, S. Nandi, F. Barbhuiya, A. Sur, V. Ramachandran. A DES Approach to Intrusion Detection System for Arp Spoofing Attacks. - In: 18th Mediterranean Conference on Control & Automation (MED’10), Marrakech, Morocco, 2010, pp. 695-700.10.1109/MED.2010.5547790Search in Google Scholar

26. Barbhuiya, F., S. Biswas, N. Hubballi, S. Nandi. A Host Based DES Approach for Detecting Arp Spoofing, Computational Intelligence in Cyber Security (CICS). - In: IEEE Symposium on, Paris, France, 2011, pp. 114-121.10.1109/CICYBS.2011.5949401Search in Google Scholar

27. Al-Hemairy, M., S. Amin, Z. Trabelsi. Towards More Sophisticated ARP Spoofing Detection/Prevention Systems in LAN Networks. - In: Proc. of 2009 International Conference on the Current Trends in Information Technology (CTIT’09), 2009.10.1109/CTIT.2009.5423112Search in Google Scholar

28. Dangol, S., S. Selvakumar, M. Brindh a. Genuine ARP (GARP). - ACM SIGSOFT Softw. Eng. Notes, Vol. 36, 2011, No 4, p. 1.10.1145/1988997.1989013Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology