{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T15:48:22Z","timestamp":1751298502829,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T00:00:00Z","timestamp":1693008000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T00:00:00Z","timestamp":1693008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-21-1-0326","W911NF-21-1-0326"],"award-info":[{"award-number":["W911NF-21-1-0326","W911NF-21-1-0326"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"crossref","award":["W911NF-21-1-0326","W911NF-21-1-0326","W911NF-21-1-0326"],"award-info":[{"award-number":["W911NF-21-1-0326","W911NF-21-1-0326","W911NF-21-1-0326"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00749-0","type":"journal-article","created":{"date-parts":[[2023,8,26]],"date-time":"2023-08-26T18:01:45Z","timestamp":1693072905000},"page":"373-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["GaTeBaSep: game theory-based security protocol against ARP spoofing attacks in software-defined networks"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4396-8367","authenticated-orcid":false,"given":"Fabrice","family":"Mvah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-1859","authenticated-orcid":false,"given":"Vianney","family":"Kengne Tchendji","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2231-3281","authenticated-orcid":false,"given":"Cl\u00e9mentin","family":"Tayou Djamegni","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-3043","authenticated-orcid":false,"given":"Ahmed H.","family":"Anwar","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8492-1066","authenticated-orcid":false,"given":"Deepak K.","family":"Tosh","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2169-5975","authenticated-orcid":false,"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,26]]},"reference":[{"issue":"2","key":"749_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3057268","volume":"50","author":"CT Do","year":"2017","unstructured":"Do, C.T., Tran, N.H., Hong, C., Kamhoua, C.A., Kwiat, K.A., Blasch, E., Ren, S., Pissinou, N., Iyengar, S.S.: Game theory for cyber security and privacy. ACM Comput. Surv. 50(2), 1\u201330 (2017). https:\/\/doi.org\/10.1145\/3057268","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"749_CR2","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MITP.2015.21","volume":"17","author":"W Houser","year":"2015","unstructured":"Houser, W.: Could what happened to sony happen to us? IT Prof. 17(2), 54\u201357 (2015). https:\/\/doi.org\/10.1109\/MITP.2015.21","journal-title":"IT Prof."},{"key":"749_CR3","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.B3801.129219","author":"C Divya","year":"2019","unstructured":"Divya, C., Francis Xavier Christopher, D.: Sm-Arp Stochastic markovian game model for packet forwarding based arp spoofing attacks detection. Int. J. Eng. Adv. Technol. IJEAT (2019). https:\/\/doi.org\/10.35940\/ijeat.B3801.129219","journal-title":"Int. J. Eng. Adv. Technol. IJEAT"},{"key":"749_CR4","doi-asserted-by":"publisher","unstructured":"Gao, W.H., Sun, Y.H., Fu,\u00a0Q., Wu,\u00a0Z., Ma,\u00a0X., Zheng, K., Huang, X.: Arp poisoning prevention in internet of things. In: 9th International Conference on Information Technology in Medicine and Education (ITME), pp. 733\u2013736 (2018). https:\/\/doi.org\/10.1109\/ITME.2018.00166","DOI":"10.1109\/ITME.2018.00166"},{"key":"749_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1155\/2022\/2196998","volume":"20","author":"Y Jeong","year":"2022","unstructured":"Jeong, Y., Kim, H., Jo, H.J.: ASD: ARP spoofing detector using openwrt. Secur. Commun. Netw. 20, 22 (2022). https:\/\/doi.org\/10.1155\/2022\/2196998","journal-title":"Secur. Commun. Netw."},{"key":"749_CR6","doi-asserted-by":"publisher","first-page":"49142","DOI":"10.1109\/ACCESS.2022.3172329","volume":"10","author":"SM Morsy","year":"2022","unstructured":"Morsy, S.M., Nashat, D.: D-ARP: an efficient scheme to detect and prevent ARP spoofing. IEEE Access 10, 49142\u201349153 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3172329","journal-title":"IEEE Access"},{"key":"749_CR7","first-page":"194","volume":"7","author":"A Chauhan","year":"2016","unstructured":"Chauhan, A., Yadav, R.K.: Detection of MAC spoofing using SVM technique. Int. J. Comput. Sci. Technol. (IJCST) 7, 194\u2013197 (2016)","journal-title":"Int. J. Comput. Sci. Technol. (IJCST)"},{"key":"749_CR8","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130647","author":"AA Galal","year":"2022","unstructured":"Galal, A.A., Ghalwash, A.Z., Nasr, M.: A new approach for detecting and mitigating address resolution protocol (ARP) poisoning. Int. J. Adv. Comput. Sci. Appl. (2022). https:\/\/doi.org\/10.14569\/IJACSA.2022.0130647","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"749_CR9","doi-asserted-by":"publisher","unstructured":"Ma, H., Ding, H., Yang, Y., Mi, Z., Zhang, M.: SDN-based ARP attack detection for cloud centers. In: IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and IEEE 12th Intl Conf on Autonomic and Trusted Computing and IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-SCALCOM), pp. 1049\u20131054 (2015). https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195"},{"key":"749_CR10","first-page":"2278","volume":"8","author":"D Chakrala","year":"2019","unstructured":"Chakrala, D., D\u00a0Francis\u00a0Xavier, C.: Security against ARP spoofing attacks using Bayesian support vector regression. Int. J. Innov. Technol. Explor. Eng. (IJITEE) 8, 2278\u20133075 (2019)","journal-title":"Int. J. Innov. Technol. Explor. Eng. (IJITEE)"},{"key":"749_CR11","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s41635-020-00105-x","volume":"1","author":"VK Tchendji","year":"2021","unstructured":"Tchendji, V.K., Mvah, F., Djamegni, C.T., Yankam, Y.F.: E2basep: efficient Bayes based security protocol against ARP spoofing attacks in SDN architectures. J. Hardw. Syst. Secur. 1, 17 (2021). https:\/\/doi.org\/10.1007\/s41635-020-00105-x","journal-title":"J. Hardw. Syst. Secur."},{"key":"749_CR12","doi-asserted-by":"publisher","first-page":"012022","DOI":"10.1088\/1742-6596\/1911\/1\/012022","volume":"1911","author":"A Majumdar","year":"2021","unstructured":"Majumdar, A., Raj, S., Subbulakshmi, T.: Arp poisoning detection and prevention using scapy. J. Phys. Conf. Ser. 1911, 012022 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1911\/1\/012022","journal-title":"J. Phys. Conf. Ser."},{"key":"749_CR13","doi-asserted-by":"publisher","unstructured":"Data, M.: The defense against arp spoofing attack using semi-static arp cache table. In: International Conference on Sustainable Information Engineering and Technology (SIET), pp. 206\u2013210 (2018). https:\/\/doi.org\/10.1109\/SIET.2018.8693155","DOI":"10.1109\/SIET.2018.8693155"},{"key":"749_CR14","doi-asserted-by":"publisher","unstructured":"Ortega, A.P., Marcos, X.E., Chiang, L.D., Abad, C.L.: Preventing ARP cache poisoning attacks: a proof of concept using openwrt. In: Latin American Network Operations and Management Symposium, LANOMS, Punta del Este, Uruguay: Proceedings. IEEE 2009, (2009). https:\/\/doi.org\/10.1109\/LANOMS.2009.5338799","DOI":"10.1109\/LANOMS.2009.5338799"},{"key":"749_CR15","doi-asserted-by":"publisher","unstructured":"Puangpronpitag, S., Masusai, N.: An efficient and feasible solution to arp spoof problem. In: 6th International Conference on Electrical Engineering\/Electronics, Computer, Telecommunications and Information Technology 2, 910\u2013913 (2009). https:\/\/doi.org\/10.1109\/ECTICON.2009.5137193","DOI":"10.1109\/ECTICON.2009.5137193"},{"issue":"10","key":"749_CR16","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.3390\/electronics8101095","volume":"8","author":"S Zawar","year":"2019","unstructured":"Zawar, S., Steve, C.: Mitigating ARP cache poisoning attack in software-defined networking (SDN): a survey. Electronics 8(10), 1095 (2019). https:\/\/doi.org\/10.3390\/electronics8101095","journal-title":"Electronics"},{"key":"749_CR17","first-page":"13","volume":"7","author":"S Sahoo\u00a0Kshira","year":"2017","unstructured":"Sahoo\u00a0Kshira, S., Mishra\u00a0Sambit, K., Sahoo, S., Sahoo, B.: Software defined network: the next generation internet technology. Int. J. Wirel. Microw. Technol. 7, 13\u201324 (2017). (http:\/\/hdl.handle.net\/2080\/2685)","journal-title":"Int. J. Wirel. Microw. Technol."},{"key":"749_CR18","doi-asserted-by":"publisher","first-page":"106990","DOI":"10.1016\/j.compeleceng.2021.106990","volume":"90","author":"T Girdler","year":"2021","unstructured":"Girdler, T., Vassilakis, V.G.: Implementing an intrusion detection and prevention system using software-defined networking: defending against ARP spoofing attacks and blacklisted MAC addresses. Comput. Electr. Eng. 90, 106990 (2021). https:\/\/doi.org\/10.1016\/j.compeleceng.2021.106990","journal-title":"Comput. Electr. Eng."},{"key":"749_CR19","doi-asserted-by":"crossref","unstructured":"Oliveira, R., Shinoda,\u00a0A.A., Schweitzer, C.M., Rog\u00e9rio,\u00a0L.I., Ligia R.P.: L3-arpsec\u2014a secure openflow network controller module to control and protect the address resolution protocol. In: XXXIII Simp\u00f3sio Brasileiro De Telecomunica\u00e7\u00f5es\u2013(SBrT2015), pp. 158\u2013162 (2015)","DOI":"10.14209\/sbrt.2015.29"},{"key":"749_CR20","doi-asserted-by":"publisher","unstructured":"Alharbi, T., Durando, D., Pakzad, F., Portmann, M.: Securing ARP in software defined networks. In: 41st IEEE Conference on Local Computer Networks, LCN 2016, Dubai, United Arab Emirates, pp. 523\u2013526. IEEE Computer Society (2016). https:\/\/doi.org\/10.1109\/LCN.2016.83","DOI":"10.1109\/LCN.2016.83"},{"key":"749_CR21","doi-asserted-by":"publisher","unstructured":"Abdelsalam, A., El-Sisi, A., Reddy, V.: Mitigating arp spoofing attacks in software-defined networks. In: 25th International Conference on Computer Theory and Applications (ICCTA), pp. 126\u2013131 (2015). https:\/\/doi.org\/10.1109\/ICCTA37466.2015.9513433","DOI":"10.1109\/ICCTA37466.2015.9513433"},{"key":"749_CR22","first-page":"14823","volume":"13","author":"B Deepa","year":"2018","unstructured":"Deepa, B., Agnise Kala, R.X.: A technique for a software-defined and network-based ARP spoof detection and mitigation. Int. J. Appl. Eng. Res. 13, 14823\u201314826 (2018)","journal-title":"Int. J. Appl. Eng. Res."},{"key":"749_CR23","doi-asserted-by":"publisher","unstructured":"Cox Jacob, H., Clark Russell, J., Owen, H.L.: Leveraging SDN for arp security. In: SoutheastCon 2016, 1\u20138 (2016). https:\/\/doi.org\/10.1109\/SECON.2016.7506644","DOI":"10.1109\/SECON.2016.7506644"},{"key":"749_CR24","doi-asserted-by":"publisher","unstructured":"Nehra, A., Tripathi, M., Gaur, M.: FICUR: employing SDN programmability to secure ARP. In: IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC), pp. 1\u20138 (2017). https:\/\/doi.org\/10.1109\/CCWC.2017.7868450","DOI":"10.1109\/CCWC.2017.7868450"},{"key":"749_CR25","doi-asserted-by":"publisher","unstructured":"Wei, H., Chunhe, X., Haiquan, W., Cheng, Z., Yi,\u00a0J.: A game theoretical attack-defense model oriented to network security risk assessment. In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 6: Graphic Communication \/ Other Applications, Wuhan, China, pp. 498\u2013504. IEEE Computer Society (2008). https:\/\/doi.org\/10.1109\/CSSE.2008.1651","DOI":"10.1109\/CSSE.2008.1651"},{"issue":"12","key":"749_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-019-1228-4","volume":"44","author":"B Kumar","year":"2019","unstructured":"Kumar, B., Bhuyan, B.: Using game theory to model dos attack and defence. S\u0101dhan\u0101 44(12), 1\u201312 (2019). https:\/\/doi.org\/10.1007\/s12046-019-1228-4","journal-title":"S\u0101dhan\u0101"},{"key":"749_CR27","doi-asserted-by":"publisher","unstructured":"Kaho, W., Joel, C.: Game-theoretic modeling of DDoS attacks in cloud computing. In: UCC \u201921: 2021 IEEE\/ACM 14th International Conference on Utility and Cloud Computing, Leicester, pp. 1:1\u20131:10. ACM (2021). https:\/\/doi.org\/10.1145\/3468737.3494093","DOI":"10.1145\/3468737.3494093"},{"key":"749_CR28","doi-asserted-by":"publisher","unstructured":"Chowdhary, A., Pisharody, S., Alshamrani, A., Huang, D.: Dynamic game based security framework in sdn-enabled cloud networking environments. In: Ahn, G.J., Gu, G., Hu, H., Shin, S. (eds.) Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, pp. 53\u201358. ACM (2017). https:\/\/doi.org\/10.1145\/3040992.3040998","DOI":"10.1145\/3040992.3040998"},{"key":"749_CR29","doi-asserted-by":"publisher","unstructured":"Basak, A., Kamhoua, C. A., Venkatesan, S., Gutierrez, M., Anwar, A.H., Kiekintveld, C.: Identifying stealthy attackers in a game theoretic framework using deception. In: Decision and Game Theory for Security\u201410th International Conference, GameSec 2019, Stockholm, Sweden, Proceedings, volume 11836 of Lecture Notes in Computer Science, pp. 21\u201332. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-32430-8_2","DOI":"10.1007\/978-3-030-32430-8_2"},{"key":"749_CR30","doi-asserted-by":"publisher","unstructured":"de\u00a0Oliveira, R.L.S., Schweitzer, C.M., Shinoda, A.A: Ligia Rodrigues Prete. Using mininet for emulation and prototyping software-defined networks. In: 2014 IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136 (2014). https:\/\/doi.org\/10.1109\/ColComCon.2014.6860404","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"749_CR31","doi-asserted-by":"crossref","unstructured":"Sahoo, K.S., Mohanty, S., Tiwary, M., Mishra\u00a0Brojo, K., Sahoo, B.: A comprehensive tutorial on software defined network: the driving force for the future internet technology. In: Proceedings of the International Conference on Advances in Information Communication Technology & Computing, pp. 1\u20136 (2016)","DOI":"10.1145\/2979779.2983928"},{"key":"749_CR32","doi-asserted-by":"crossref","unstructured":"De\u00a0Oliveira, R.L.S., Marie Schweitzer, C., Akira Shinoda, A., Rodrigues Prete, L.: Using mininet for emulation and prototyping software-defined networks. In: IEEE Colombian Conference on Communications and Computing (COLCOM), pp. 1\u20136 (2014)","DOI":"10.1109\/ColComCon.2014.6860404"},{"key":"749_CR33","doi-asserted-by":"publisher","unstructured":"Ghadeer, D., Vorobeva\u00a0Alisa, A., Korzhuk\u00a0Viktoriia, M.: An efficient mechanism to detect and mitigate an ARP spoofing attack in software-defined networks. J. Sci. Tech. Inf. Technol. Mech. Opt. 133(3), 401\u2013409 (2021). https:\/\/doi.org\/10.17586\/2226-1494-2021-21-3-401-409","DOI":"10.17586\/2226-1494-2021-21-3-401-409"},{"key":"749_CR34","doi-asserted-by":"publisher","first-page":"012061","DOI":"10.1088\/1742-6596\/1791\/1\/012061","volume":"1791","author":"PP Stepanov","year":"2021","unstructured":"Stepanov, P.P., Nikonova, G.V., Pavlychenko, T.S., Gil, A.S.: The problem of security address resolution protocol. J. Phys. Conf. Ser. 1791, 012061 (2021). https:\/\/doi.org\/10.1088\/1742-6596\/1791\/1\/012061","journal-title":"J. Phys. Conf. Ser."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00749-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00749-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00749-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:08:37Z","timestamp":1705972117000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00749-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,26]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["749"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00749-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,8,26]]},"assertion":[{"value":"26 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest. This article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}