{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:58Z","timestamp":1750306258799,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T00:00:00Z","timestamp":1490140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,22]]},"DOI":"10.1145\/3018896.3018915","type":"proceedings-article","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T16:12:59Z","timestamp":1519402379000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A mitigation system for ARP cache poisoning attacks"],"prefix":"10.1145","author":[{"given":"B.","family":"Prabadevi","sequence":"first","affiliation":[{"name":"VIT University, Vellore, India"}]},{"given":"N.","family":"Jeyanthi","sequence":"additional","affiliation":[{"name":"VIT University, Vellore, India"}]}],"member":"320","published-online":{"date-parts":[[2017,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. Plummer. 1982 An ethernet address resolution protocol RFC 826.   D. Plummer. 1982 An ethernet address resolution protocol RFC 826."},{"key":"e_1_3_2_1_2_1","unstructured":"B. Prabadevi and N. Jeyanthi. 2016. A framework to mitigate ARP Sniffing attacks by Cache Poisoning International Journal of Advanced Intelligence Paradigms Accepted Yet to publish.  B. Prabadevi and N. Jeyanthi. 2016. A framework to mitigate ARP Sniffing attacks by Cache Poisoning International Journal of Advanced Intelligence Paradigms Accepted Yet to publish."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2007.19"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SNCC.2014.6866508"},{"issue":"1","key":"e_1_3_2_1_5_1","first-page":"207","article-title":"An Innovative Method for Detection and Prevention Against ARP Spoofing in MANET","volume":"5","author":"Shukla Shradha","year":"2015","unstructured":"Shradha Shukla and Indresh Yadav . 2015 . An Innovative Method for Detection and Prevention Against ARP Spoofing in MANET , International Journal of Computer Science and Information Technology & Security , Vol. 5 , No 1 , pp. 207 -- 214 . Shradha Shukla and Indresh Yadav. 2015. An Innovative Method for Detection and Prevention Against ARP Spoofing in MANET, International Journal of Computer Science and Information Technology & Security, Vol. 5, No 1, pp.207 -- 214.","journal-title":"International Journal of Computer Science and Information Technology & Security"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"IEEE International Conference on Computer Communication and Informatics","author":"Jinhua Gao","unstructured":"Gao Jinhua and Xia Kejian .2013. ARP Spoofing Detection Algorithm Using ICMP Protocol , IEEE International Conference on Computer Communication and Informatics , Coimbatore, India , pp. 1 -- 6 . Gao Jinhua and Xia Kejian.2013. ARP Spoofing Detection Algorithm Using ICMP Protocol, IEEE International Conference on Computer Communication and Informatics, Coimbatore, India, pp. 1--6."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CTIT.2009.5423112"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5120\/19935-1931"},{"issue":"1","key":"e_1_3_2_1_9_1","first-page":"105","article-title":"An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries","volume":"5","author":"AbdelSalam Ahmed M.","year":"2014","unstructured":"Ahmed M. AbdelSalam , Wail S. Elkilani and Khalid M. Amin . 2014 . An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries , International Journal of Advanced Computer Science and Applications , Vol. 5 , No. 1 , pp. 105 -- 112 . Ahmed M. AbdelSalam, Wail S. Elkilani and Khalid M. Amin. 2014. An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries, International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1, pp. 105--112.","journal-title":"International Journal of Advanced Computer Science and Applications"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3311"},{"key":"e_1_3_2_1_11_1","first-page":"81","volume-title":"Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis","author":"Kalajdzic K.","unstructured":"K. Kalajdzic and A. Patel . 2011. Active Detection and Prevention of Sophisticated ARPPoisoning Man-in-the-Middle Attacks on Switched Ethernet LANs , Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis , pp. 81 -- 92 . K. Kalajdzic and A. Patel. 2011. Active Detection and Prevention of Sophisticated ARPPoisoning Man-in-the-Middle Attacks on Switched Ethernet LANs, Proceedings of the Sixth International Workshop on Digital Forensics & Incident Analysis, pp.81--92."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2010.032618"},{"key":"e_1_3_2_1_13_1","first-page":"147","volume-title":"3rd IEEE International Advance Computing Conference","author":"Pandey Poonam","year":"2013","unstructured":"Poonam Pandey . 2013 , Prevention of ARP Spoofing AProbe based technique , 3rd IEEE International Advance Computing Conference , pp. 147 -- 153 , Ghaziabad. Poonam Pandey. 2013, Prevention of ARP Spoofing AProbe based technique, 3rd IEEE International Advance Computing Conference, pp.147--153, Ghaziabad."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSec.2012.6246087"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINE.2015.34"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"2013 IEEE International Conference on Computational Intelligence and Computing Research","author":"Tripathi Nikhil","unstructured":"Nikhil Tripathi and B. M. Mehtre . 2013, An ICMP based Secondary Cache approach for the detection and prevention of ARP Poisoning , 2013 IEEE International Conference on Computational Intelligence and Computing Research , Enathi pp. 1 -- 6 . Nikhil Tripathi and B. M. Mehtre.2013, An ICMP based Secondary Cache approach for the detection and prevention of ARP Poisoning, 2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi pp.1--6."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956434"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.05.007"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988997.1989013"}],"event":{"name":"ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing","acronym":"ICC '17","location":"Cambridge United Kingdom"},"container-title":["Proceedings of the Second International Conference on Internet of things, Data and Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018915","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3018896.3018915","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:12Z","timestamp":1750220652000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3018896.3018915"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,22]]},"references-count":19,"alternative-id":["10.1145\/3018896.3018915","10.1145\/3018896"],"URL":"https:\/\/doi.org\/10.1145\/3018896.3018915","relation":{},"subject":[],"published":{"date-parts":[[2017,3,22]]},"assertion":[{"value":"2017-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}