ARCHIVES

Original Article

Implementation of Dynamic ARP Inspection for Enhanced Network Security

Pranav R Pillai1 C. Vishnu Priya2
1M. sc., CFIS, Department of Computer Science and Engineering, Dr. MGR University, Chennai, Tamilnadu, India. 2Assistant Professor, Cyber Forensics and Information Security, IDE, University of Madras, Chepauk. Chennai, Tamilnadu, India.

Published Online: January-April 2025

Pages: 161-165

References

1. Scapy. (n.d.). Scapy Documentation. Retrieved from https://scapy.readthedocs.io/en/latest/
2. Flask. (n.d.). Flask Web Framework Documentation. Retrieved from https://flask.palletsprojects.com/
3. VirusTotal. (n.d.). VirusTotal API Documentation. Retrieved from https://developers.virustotal.com Mohanta, B. K., Sahu, S. K., & Panda,
S. (2020)
4. A review on detection and prevention of ARP spoofing attacks. Journal of Cyber Security Technology, 4(1), 1–16.
https://doi.org/10.1080/23742917.2020.1719141
5. Tripathi, S., & Chaurasia, B. K. (2022) ARP poisoning attack and its countermeasures: A survey. International Journal of Network
Security, 24(2), 239–250. https://doi.org/10.6633/IJNS.202203.24(2).11
6. Chatterjee, S., & Misra, S. (2019).An intrusion detection system for ARP spoofing using active MAC address verification. Computer
Standards & Interfaces, 64, 94–105. Https://doi.org/10.1016/j.csi.2018.11.002
7. Kar, P., & Bharati, R. (2019). Detection and mitigation of ARP spoofing using active probing and MAC verification. Procedia Computer
Science, 167, 1194– 1203 https://doi.org/10.1016/j.procs.2020.03.426
8. Bhandari, R., & Lamba, A. (2018).Enhancing LAN security by implementing ARP inspection using Python. International Journal of
Computer Applications, 180(27), 1–4.https://doi.org/10.5120/ijca2018917394
9. Dhanalakshmi, S., & Kannammal, E. (2016).Prevention of ARP spoofing attacks using virtual agents. Procedia Computer Science, 85, 13–
20. https://doi.org/10.1016/j.procs.2016.05.174
10. Kumar, R., & Manjusha, N. (2017).Real-time detection and prevention of ARP spoofing attack using IDS. International Journal of
Engineering & Technology, 9(3), 484–491.https://doi.org/10.14419/ijet.v9i3.19699.11. Parulkar, G., & Choudhary, M. (2021). ARP spoof detection using packet analysis and monitoring techniques. International Journal of
Advanced Research in Computer and Communication Engineering, 10(4), 45–50.https://ijarcce.com/wp-
content/uploads/2021/04/IJARCCE.2021.10409.pdf
12. SQLAlchemy. (n.d.). SQLAlchemy Documentation. Retrieved from https://docs.sqlalchemy.org
13. Patil, A., & Gawande, R. (2020). Detection and prevention of ARP spoofing using Python and Scapy. International Journal of Scientific
Research in Computer Science, Engineering and Information Technology, 6(2), 101–105.https://ijsrcseit.com/paper/2020/6/2/1204.pdf
14. Pooja, A., & Ranjan, S. (2019). Evaluating the effectiveness of real-time network monitoring for ARP spoofing attacks. International
Journal of Computer Sciences and Engineering, 7(12), 65–70.https://www.ijcseonline.org/pdf_paper_view.php?paper_id=5247&14-
IJCSE-07122.pdf
15. Jain, R., & Sharma, S. (2021). Real-time intrusion detection and network traffic analysis: A review. International Journal of Engineering
Research & Technology (IJERT), 10(5), 200–205.https://www.ijert.org/research/real-time-intrusion-detection-and-network-traffic-
analysis-IJERTV10IS050125.pdf.

Related Articles

2025

Transforming Cyber-Physical Systems: Machine Learning for Secure and Efficient Solutions

2025

Exploring AI Techniques for Quantum Threat Detection and Prevention

2025

Maturity Models for Business Intelligence: An Overview

2025

INSPIRO: An AI Driven Institution Auditor

2025

Adaptive AI Framework for Anomaly Detection and DDoS Mitigation in Distributed Systems

2025

Predictive Modeling for College Admission Using Machine Learning and Statistical Methods

Share Article

X
LinkedIn
Facebook
WhatsApp

Or copy link

https://test.indjcst.com/archives/10.59256/indjcst.20250401024

*Instagram doesn't support direct link sharing from web. Copy the link and share it in your Instagram story or post.