A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Defense technique against spoofing attacks using reliable ARP table in cloud computing environment
2015
2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS)
Recently cloud service has been introduced in order for many enterprises to achieve purposes such as improvement in efficiency, cost reduction and revolution in business process. However spoofing or poison attacks on VM inside the cloud cause the deterioration of cloud system and those attacks can make the huddle for spreading the cloud services. Many researches are now under way to solve such problems but most of these seem to be passive and limited in terms of detecting attacks and applying
doi:10.1109/apnoms.2015.7275401
dblp:conf/apnoms/KangSH15
fatcat:3wxhe2ijlrfcnd67qp6ttwiamm