{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T22:53:49Z","timestamp":1762642429233,"version":"3.37.3"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Hardw Syst Secur"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s41635-020-00105-x","type":"journal-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T07:02:36Z","timestamp":1601535756000},"page":"58-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["E2BaSeP: Efficient Bayes Based Security Protocol Against ARP Spoofing Attacks in SDN Architectures"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3836-1859","authenticated-orcid":false,"given":"Vianney Kengne","family":"Tchendji","sequence":"first","affiliation":[]},{"given":"Fabrice","family":"Mvah","sequence":"additional","affiliation":[]},{"given":"Cl\u00e9mentin Tayou","family":"Djamegni","sequence":"additional","affiliation":[]},{"given":"Yannick Florian","family":"Yankam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"key":"105_CR1","doi-asserted-by":"crossref","unstructured":"Divya C, Christopher XFD (2019) SM-ARP: stochastic Markovian game model for packet forwarding based ARP spoofing attacks detection. International Journal of Engineering and Advanced Technology (IJEAT)","DOI":"10.35940\/ijeat.B3801.129219"},{"key":"105_CR2","doi-asserted-by":"crossref","unstructured":"Gao W, Sun Y, Fu Q, Wu Z, Ma X, Zheng K, Huang X (2018) ARP poisoning prevention in Internet of Things. IEEE Communications Letters, 733\u2013736, International Conference on Information Technology in Medicine and Education (ITME)","DOI":"10.1109\/ITME.2018.00166"},{"key":"105_CR3","unstructured":"Plummer CD (1982) An ethernet address resolution protocol. INTERNET STANDARD. https:\/\/tools.ietf.org\/html\/rfc826.Accessed08January2020"},{"key":"105_CR4","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1007\/s11227-014-1353-0","volume":"72","author":"D Moon","year":"2014","unstructured":"Moon D, Lee JD, Jeong YS, Park JH (2014) RTNSS: A routing trace-based network security system for preventing ARP spoofing attacks. J Supercomput 72:1740\u20131756. https:\/\/doi.org\/10.1007\/s11227-014-1353-0","journal-title":"J Supercomput"},{"key":"105_CR5","doi-asserted-by":"publisher","unstructured":"Trabelsi Z, El-Hajj W (2007) Preventing ARP attacks using a fuzzy-based stateful ARP cache. In: 2007 IEEE international conference on communications, pp 1355\u20131360. https:\/\/doi.org\/10.1109\/ICC.2007.228","DOI":"10.1109\/ICC.2007.228"},{"key":"105_CR6","first-page":"194","volume":"7","author":"A Chauhan","year":"2016","unstructured":"Chauhan A, Yadav KR (2016) Detection of MAC spoofing using SVM technique. Int J Comput Sci Technol 7:194\u2013197","journal-title":"Int J Comput Sci Technol"},{"key":"105_CR7","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1109\/MCOM.2013.6461198","volume":"51","author":"HS Yeganeh","year":"2013","unstructured":"Yeganeh HS, Tootoonchian A, Ganjali Y (2013) On scalability of software-defined networking. IEEE Commun Mag 51:136\u2013141. https:\/\/doi.org\/10.1109\/MCOM.2013.6461198","journal-title":"IEEE Commun Mag"},{"key":"105_CR8","doi-asserted-by":"publisher","unstructured":"Ma H, Ding H, Yang Y, Mi Z, Zhang M (2015) SDN-based ARP attack detection for cloud centers. In: 2015 IEEE 12th intl conf on ubiquitous intelligence and computing and 2015 IEEE 12th intl conf on autonomic and trusted computing and IEEE 15th intl conf on scalable computing and communications and its associated workshops (UIC-ATC-ScalCom), Beijing. vol 00 pp 1049\u20131054. https:\/\/doi.org\/10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195"},{"key":"105_CR9","first-page":"2278","volume":"8","author":"C Divya","year":"2019","unstructured":"Divya C, Christopher XFD (2019) Security against ARP spoofing attacks using Bayesian support vector regression. Int J Innov Tech Explor Eng (IJITEE) 8:2278\u20133075","journal-title":"Int J Innov Tech Explor Eng (IJITEE)"},{"key":"105_CR10","doi-asserted-by":"publisher","unstructured":"Data M (2018) The defense against ARP spoofing attack using semi-static ARP cache table. In: 2018 International conference on sustainable information engineering and technology (SIET), pp 206\u2013210. https:\/\/doi.org\/10.1109\/SIET.2018.8693155","DOI":"10.1109\/SIET.2018.8693155"},{"key":"105_CR11","first-page":"14823","volume":"13","author":"D Balagopal","year":"2018","unstructured":"Balagopal D, Rani XAK (2018) A technique for a software-defined and network-based ARP spoof detection and mitigation. Int J Appl Eng Res 13:14823\u201314826","journal-title":"Int J Appl Eng Res"},{"key":"105_CR12","doi-asserted-by":"publisher","unstructured":"Abad LC, Bonilla IR (2007) An analysis on the schemes for detecting and preventing ARP cache poisoning attacks. In: 27th International conference on distributed computing systems workshops (ICDCSW\u201907), pp 60\u201360. https:\/\/doi.org\/10.1109\/ICDCSW.2007.19","DOI":"10.1109\/ICDCSW.2007.19"},{"key":"105_CR13","doi-asserted-by":"publisher","unstructured":"Puangpronpitag S, Masusai N (2009) An efficient and feasible solution to ARP spoof problem. In: 2009 6th International conference on electrical engineering\/electronics, computer telecommunications and information technology, vol 02, pp 910\u2013913. https:\/\/doi.org\/10.1109\/ECTICON.2009.5137193","DOI":"10.1109\/ECTICON.2009.5137193"},{"key":"105_CR14","unstructured":"Shukla S, Yadav I (2015) An innovative method for detection and prevention against ARP spoofing in MANET. International Journal of Computer Science and Information Technology and Security (IJCSITS)"},{"key":"105_CR15","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/ICCASM.2010.5619113","volume":"5","author":"X Hou","year":"2010","unstructured":"Hou X, Jiang Z, Tian X (2010) The detection and prevention for ARP spoofing based on snort. Int Conf Comput Appl Syst Model 5:137\u2013139. https:\/\/doi.org\/10.1109\/ICCASM.2010.5619113","journal-title":"Int Conf Comput Appl Syst Model"},{"key":"105_CR16","doi-asserted-by":"publisher","first-page":"555","DOI":"10.1109\/CSIE.2009.122","volume":"2","author":"A Qian","year":"2009","unstructured":"Qian A (2009) The automatic prevention and control research of ARP deception and implementation. WRI World Congr Comput Sci Inf Eng 2:555\u2013558. https:\/\/doi.org\/10.1109\/CSIE.2009.122","journal-title":"WRI World Congr Comput Sci Inf Eng"},{"key":"105_CR17","doi-asserted-by":"publisher","unstructured":"Boughrara A, Mammar S (2012) Implementation of a SNORT\u2019s output Plug-In in reaction to ARP Spoofing\u2019s attack. In: 2012 6th International conference on sciences of electronics, technologies of information and telecommunications (SETIT), pp 643\u2013647. https:\/\/doi.org\/10.1109\/SETIT.2012.6481988","DOI":"10.1109\/SETIT.2012.6481988"},{"key":"105_CR18","doi-asserted-by":"publisher","unstructured":"Ortega PA, Marcos EX, Chiang DL, Abad LC (2009) Preventing ARP cache poisoning attacks: a proof of concept using OpenWrt. In: 2009 Latin american network operations and management symposium, LANOMS 2009, Punta del Este, Uruguay, October 19-21, 2009, Proceedings. https:\/\/doi.org\/10.1109\/LANOMS.2009.5338799","DOI":"10.1109\/LANOMS.2009.5338799"},{"key":"105_CR19","doi-asserted-by":"publisher","unstructured":"Mohan D, Rishabh P, Kshiteej M, Vijay M (2015) SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual network and distributed system security symposium, NDSS 2015, San Diego, California, USA, February pp 8\u201311. https:\/\/doi.org\/10.14722\/ndss.2015.23064","DOI":"10.14722\/ndss.2015.23064"},{"key":"105_CR20","doi-asserted-by":"crossref","unstructured":"Abdelsalam MA, Ashraf E, Reddy V (2015) Mitigating ARP spoofing attacks in software-defined networks. In: Conference: ICCTA 2015, At Alexandria, Egypt","DOI":"10.1109\/ICCTA37466.2015.9513433"},{"key":"105_CR21","doi-asserted-by":"publisher","unstructured":"Alharbi T, Durando D, Pakzad F, Portmann M (2016) Securing ARP in software defined networks. In: 2016 IEEE 41st conference on local computer networks (LCN), pp 523-526. https:\/\/doi.org\/10.1109\/LCN.2016.83","DOI":"10.1109\/LCN.2016.83"},{"key":"105_CR22","doi-asserted-by":"publisher","unstructured":"Fahad U, Rashid A, Faisal B, Muhammad M (2017) Mitigating address spoofing attacks in hybrid SDN. International Journal of Advanced Computer Science and Applications. https:\/\/doi.org\/10.14569\/IJACSA.2017.080474","DOI":"10.14569\/IJACSA.2017.080474"},{"key":"105_CR23","unstructured":"Lallo R, Lospoto G, Rimondini M, Battista G (2016) How to handle ARP in a software-defined network"},{"key":"105_CR24","unstructured":"Oliveira SLR, Schweitzer MC, Shinoda AA, Prete RL (2014) Using Mininet for emulation and prototyping Software-Defined Networks"},{"key":"105_CR25","doi-asserted-by":"publisher","first-page":"1095","DOI":"10.3390\/electronics8101095","volume":"8","author":"S Zawar","year":"2019","unstructured":"Zawar S, Steve C (2019) Mitigating ARP cache poisoning attack in software-defined networking (SDN): a survey. Electronics 8:1095","journal-title":"Electronics"},{"key":"105_CR26","doi-asserted-by":"publisher","unstructured":"Jehan N, Haneef MA (2015) Scalable ethernet architecture using SDN by suppressing broadcast traffic. In: 2015 Fifth international conference on advances in computing and communications (ICACC), pp 24\u201327. https:\/\/doi.org\/10.1109\/ICACC.2015.66","DOI":"10.1109\/ICACC.2015.66"},{"key":"105_CR27","doi-asserted-by":"publisher","unstructured":"Balagopal D, Rani KAX (2015) NetWatch: Empowering software-defined network switches for packet filtering. In: 2015 International conference on applied and theoretical computing and communication technology (iCATccT), pp 837\u2013840. https:\/\/doi.org\/10.1109\/ICATCCT.2015.7456999","DOI":"10.1109\/ICATCCT.2015.7456999"},{"key":"105_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/SECON.2016.7506644","volume":"2016","author":"HJ Cox","year":"2016","unstructured":"Cox HJ, Clark JR, Owen LH (2016) Leveraging SDN for ARP security. SoutheastCon 2016:1\u20138. https:\/\/doi.org\/10.1109\/SECON.2016.7506644","journal-title":"SoutheastCon"},{"key":"105_CR29","doi-asserted-by":"publisher","unstructured":"Kim Y, Ahn S, Thang CN, Choi D, Park M (2019) ARP Poisoning attack detection based on ARP update state in software-defined networks. In: 2019 International conference on information networking (ICOIN), pp 366\u2013371. https:\/\/doi.org\/10.1109\/ICOIN.2019.8718158","DOI":"10.1109\/ICOIN.2019.8718158"},{"key":"105_CR30","doi-asserted-by":"publisher","unstructured":"Sagar KS, Sagarika M, Mayank T, Kishore BM, Bibhudatta S (2019) A comprehensive tutorial on software defined network: The driving force for the future internet technology. In: Proceedings of the international conference on advances in information communication technology and computing New York, NY, USA. https:\/\/doi.org\/10.1145\/2979779.2983928","DOI":"10.1145\/2979779.2983928"},{"key":"105_CR31","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz D, Ramos VMF, Ver\u00edssimo EP, Rothenberg EC, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103:14\u201376. https:\/\/doi.org\/10.1109\/JPROC.2014.2371999","journal-title":"Proc IEEE"},{"key":"105_CR32","unstructured":"Sahoo SK, Mishra KS, Sahoo S, Sahoo B (2017) Software defined network: the next generation Internet technology"},{"key":"105_CR33","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1109\/LCOMM.2010.02.092108","volume":"14","author":"YS Nam","year":"2010","unstructured":"Nam YS, Kim D, Kim J (2010) Enhanced ARP: preventing ARP poisoning-based man-in-the-middle attacks. IEEE Commun Lett 14:187\u2013189. https:\/\/doi.org\/10.1109\/LCOMM.2010.02.092108","journal-title":"IEEE Commun Lett"},{"key":"105_CR34","unstructured":"Loriya TH, Kulshreshta A, Keraliya RD (2017) Security analysis of various public key cryptosystems for authentication and key agreement in wireless communication network. International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE)"}],"container-title":["Journal of Hardware and Systems Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-020-00105-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s41635-020-00105-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s41635-020-00105-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,21]],"date-time":"2022-11-21T14:02:53Z","timestamp":1669039373000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s41635-020-00105-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["105"],"URL":"https:\/\/doi.org\/10.1007\/s41635-020-00105-x","relation":{},"ISSN":["2509-3428","2509-3436"],"issn-type":[{"type":"print","value":"2509-3428"},{"type":"electronic","value":"2509-3436"}],"subject":[],"published":{"date-parts":[[2020,10,1]]},"assertion":[{"value":"18 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}}]}}