Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Abeysinghe, D. V. D. S."

Filter results by typing the first few letters
Now showing 1 - 1 of 1
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Machine Learning-Based Detection of ARP Spoofing Attacks Using Behavioral Analysis
    (Department of Industrial Management, Faculty of Science, University of Kelaniya., 2025) Sumanasekara, S. G.; Abeysinghe, D. V. D. S.
    This research focuses on identifying and reducing ARP (Address Resolution Protocol) spoofing attacks, which pose a significant vulnerability in network security. These attacks allow attackers to manipulate data flows by linking their MAC address with a legitimate IP address. The study aims to develop a robust framework for detecting ARP spoofing behaviors and mitigating potential network attacks. The research first involved performing a behavioral analysis on ARP traffic to extract relevant features, such as ARP request frequency, IP-MAC mapping inconsistencies, time between requests, and other typical network behaviors that indicate spoofing. Various machine learning techniques were then employed, including models like Linear SVC, Logistic Regression, K-Nearest Neighbors (KNN), and Gaussian Naïve Bayes. Among these models, KNN achieved the highest accuracy of 0.94, demonstrating its effectiveness in identifying spoofing behaviors. The overall performance of the framework highlights the potential of combining behavioral analysis with machine learning to enhance network security by detecting and mitigating ARP spoofing attacks in real-time.

DSpace software copyright © 2002-2025 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify