{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T08:59:06Z","timestamp":1769158746354,"version":"3.49.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/lanoms.2009.5338799","type":"proceedings-article","created":{"date-parts":[[2009,11,30]],"date-time":"2009-11-30T14:35:53Z","timestamp":1259591753000},"page":"1-9","source":"Crossref","is-referenced-by-count":22,"title":["Preventing ARP cache poisoning attacks: A proof of concept using OpenWrt"],"prefix":"10.1109","author":[{"given":"Andre P.","family":"Ortega","sequence":"first","affiliation":[]},{"given":"Xavier E.","family":"Marcos","sequence":"additional","affiliation":[]},{"given":"Luis D.","family":"Chiang","sequence":"additional","affiliation":[]},{"given":"Cristina L.","family":"Abad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"4322","article-title":"tarp: ticket-based address resolution protocol","volume":"51","author":"lootah","year":"2007","journal-title":"Computer Networks The International Journal of Computer and Telecommunications Networking"},{"key":"17","article-title":"anticap","author":"barnaba","year":"0"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(02)00326-2"},{"key":"15","year":"0"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.1999.816040"},{"key":"13","article-title":"ebtables: ethernet bridge tables","author":"schuymer","year":"2006"},{"key":"14","article-title":"configure your catalyst for a more secure layer 2","author":"schluting","year":"2005","journal-title":"Enterprise Networking Planet"},{"key":"11","article-title":"arp spoofing detection on switched ethernet networks: a feasibility study","author":"carnut","year":"2003","journal-title":"Proceedings of the 5th Simpo?sio Seguranc?a em Informa?tica"},{"key":"12","article-title":"arp-guard","year":"0"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2008.345"},{"key":"20","first-page":"40","article-title":"an efficient solution to the arp cache poisoning problem","author":"goyal","year":"2005","journal-title":"Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP '05) published in Lecture Notes in Computer Science (LNCS 3574)"},{"key":"22","first-page":"107","article-title":"secure arp and secure dhcp protocols to mitigate security attacks","volume":"8","author":"issac","year":"2009","journal-title":"International Journal of Security and Networks"},{"key":"23","year":"0"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.19"},{"key":"25","year":"0"},{"key":"26","article-title":"openwrt","year":"2009"},{"key":"27","first-page":"156","article-title":"ticketing high-speed traffic with commodity hardware and software","author":"weigle","year":"2002","journal-title":"Proceedings of the Third Annual Passive and Active Measurement Workshop (PAM2002)"},{"key":"3","article-title":"arpoison","author":"buer","year":"0"},{"key":"2","article-title":"dsniff","author":"song","year":"0"},{"key":"10","year":"0"},{"key":"1","author":"plummer","year":"1982","journal-title":"An Ethernet Address Resolution Protocol"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1027"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2003.1254311"},{"key":"5","volume":"1","author":"stevens","year":"2001","journal-title":"TCP\/IP Illustrated"},{"key":"4","year":"0"},{"key":"9","year":"0"},{"key":"8","first-page":"26","article-title":"arp spoofing and poisoning: traffic tricks","volume":"56","author":"demuth","year":"2005","journal-title":"Linux Magazine"}],"event":{"name":"2009 Latin American Network Operations and Management Symposium - (LANOMS 2009)","location":"Punta del Este, Uruguay","start":{"date-parts":[[2009,10,19]]},"end":{"date-parts":[[2009,10,21]]}},"container-title":["2009 Latin American Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5335459\/5338789\/05338799.pdf?arnumber=5338799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T21:03:34Z","timestamp":1489871014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5338799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/lanoms.2009.5338799","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}