[1]
Miao R., Yu M., and Jain N., NIMBUS: Cloud-scale attack detection and mitigation, in Proceedings of the 2014 ACM Conference on SIGCOMM, New York, USA, 2014, pp. 121–122.
[2]
Alarifi S. and Wolthusen D., Mitigation of cloud-internal denial of service attacks, in Service Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on, Oxford, UK, 2014, pp. 478–483.
[3]
Plummer D. C., Rfc 826: An ethernet address resolution protocol, InterNet Network Working Group, 1982.
[4]
Rathod S. B. and Reddy V. K., Secure live vm migration in cloud computing: A survey, International Journal of Computer Applications, vol. 103, no. 2, pp. 18–22, 2014.
[5]
Abad C. L. and Bonilla R., An analysis on the schemes for detecting and preventing arp cache poisoning attacks, in Distributed Computing Systems Workshops, 2007. ICDCSW07. 27th International Conference on, Toronto, Canada, 2007, p. 60.
[6]
Yeganeh S. H., Tootoonchian A., and Ganjali Y., On scalability of software-defined networking, Communications Magazine, IEEE, vol. 51, no. 2, pp. 136–141, 2013.
[7]
McKeown N., Anderson T., Balakrishnan H., Parulkar G., Peterson L., Rexford J., Shenker S., and Turner J., Openflow: Enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, 2008.
[8]
Dessouky M. M., Elkilany W,, and Alfishawy N., A hardware approach for detecting the ARP attack, in Informatics and Systems (INFOS), 2010 The 7th International Conference on, Cairo, Egypt, 2010, pp. 1–8.
[9]
Barbhuiya F., Biswas S., Hubballi N., and Nandi S., A host based des approach for detecting arp spoofing, in Computational Intelligence in Cyber Security (CICS), 2011 IEEE Symposium on, Paris, France, 2011, pp. 114–121.
[10]
Tripunitara M. V. and Dutta P., A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning, in Computer Security Applications Conference, 1999. (ACSAC99) Proceedings. 15th Annual, Phoenix, UK, 1999, pp. 303–309.
[11]
Lootah W., Enck W., and McDaniel P., ¡°Tarp: Ticket-based address resolution protocol,¡± Computer Networks, vol. 51, no. 15, pp. 4322–4337, 2007.
[12]
Bruschi D., Ornaghi A., and Rosti E., S-arp: A secure address resolution protocol, in Computer Security Applications Conference, 2003. Proceedings. 19th Annual, IEEE, 2003, pp. 66–74.
[13]
Kumar S. and Tapaswi S., A centralized detection and prevention technique against arp poisoning, in Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, Kuala Lumpur, Malaysia, 2012, pp. 259–264.
[14]
Nam S. Y., Kim D., and Kim J., ¡°Enhanced arp: Preventing arp poisoning-based man-in-the-middle attacks,¡± Communications Letters, IEEE, vol. 14, no. 2, pp. 187–189, 2010.
[15]
Nam S. Y., Djuraev S., and Park M., Collaborative approach to mitigating arp poisoning-based man-in-themiddle attacks, Computer Networks, vol. 57, no. 18, pp. 3866–3884, 2013.
[16]
Gao J. and Xia K., Arp spoofing detection algorithm using icmp protocol, in Computer Communication and Informatics (ICCCI), 2013 International Conference on, Coimbatore, India, 2013, pp. 1–6.
[17]
Neminath H., Biswas S., Roopa S., Ratti R., Nandi S., Barbhuiya F., Sur A., and Ramachandran V., A des approach to intrusion detection system for arp spoofing attacks, in Control & Automation (MED), 2010 18th Mediterranean Conference on, Marrakech, Morocco, 2010, pp. 695–700.
[18]
Pandey P., Prevention of arp spoofing: A probe packet based technique, in Advance Computing Conference (IACC), 2013 IEEE 3rd International, Ghaziabad, India, 2013, pp. 147–153.
[19]
Hubballi N., Biswas S., Roopa S., Ratti R., and Nandi S., ¡°Lan attack detection using discrete event systems,¡± ISA Transactions, vol. 50, no. 1, pp. 119–130, 2011.
[20]
Ramachandran V. and Nandi S., Detecting arp spoofing: An active technique, in Information Systems Security, Jajodia S. and Mazumdar C., Eds. Springer, 2005, pp. 239–250.