arp spoofing
Recently Published Documents


TOTAL DOCUMENTS

81
(FIVE YEARS 24)

H-INDEX

8
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Jinsheng Xu ◽  
Xiaohong Yuan ◽  
Swathi Nallela ◽  
Jinghua Zhang
Keyword(s):  

Author(s):  
Ranko Petrovic ◽  
Dejan Simic ◽  
Stefan Stankovic ◽  
Miroslav Peric

2021 ◽  
Author(s):  
Anil Kumar Rangisetti ◽  
Rishabh Dwivedi ◽  
Prabhdeep Singh
Keyword(s):  

2021 ◽  
Vol 22 (5) ◽  
pp. 809-816
Author(s):  
Jun-Ho Choi ◽  
Yong-Jin Baek ◽  
Yeong-Geon Seo

Author(s):  
Hannah A.S. Adjei ◽  
Mr Tan Shunhua ◽  
George K. Agordzo ◽  
Yangyang Li ◽  
Gregory Peprah ◽  
...  
Keyword(s):  

2020 ◽  
Vol 175 (32) ◽  
pp. 20-27
Author(s):  
Mohamad Fakher Karzon ◽  
Mohammad Samir Modabbes

Author(s):  
Ilham Firdaus ◽  
Januar Al Amien ◽  
Soni Soni

Sniffing technique (ARP Spoofing) is an attack that sends fake ARP packets or ARP packets that have been modified according to the network address attacker's to poison the victim's ARP cache table. ARP spoofing attack is a dangerous attack because it can monitor the activities of victims in searching the browser and can steal social logins, office and other accounts. This attack supports the occurrence of other computer network attacks such as Denial of service, Man in the middle attack, host impersonating and others. Sniffing attacks are generally found in places that provide public Wi-Fi such as campus, libraries, cafes, and others. IDS Snort can detect sniffing attacks (Arp Spoofing). String Matching Method KMP algorithm is applied to detect attacks on snort logging files to provide alerts (messages) to users. Tests carried out are black box testing to test application functionality, and accuracy testing. All application functionality was successful, and testing the accuracy of the match between manual calculations for string matching and accurate application.


Sign in / Sign up

Export Citation Format

Share Document