@article{M5C2C31DC, title = "A Defense Technique against ARP Spoofing Attacks using a Keystone Authentication Table in the OpenStack Cloud Environment", journal = "Journal of KIISE, JOK", year = "2018", issn = "2383-630X", doi = "10.5626/JOK.2018.45.8.755", author = "Hyo Sung Kang,Choong Seon Hong", keywords = "openstack,poofing,cloud security,authentication service", abstract = "Recently cloud service has been introduced to enable many enterprises to achieve their purposes such as improving efficiency, reducing costs, and revolutionizing business processes. However spoofing or poison attacks on VM inside the cloud deteriorate the cloud system and those attacks can be a stumbling block for spreading cloud services. To solve such problems, much research has been done, but it all seems to be impractical and limited in terms of finding techniques for detecting attacks and applying to large scale of networks. In this paper, we propose a way to prevent loss of VM resources because of such attacks on the OpenStack environment by using a reliable ARP table in a cloud computing environment and showing that the proposed mechanism is an effective way to defend against the ARP spoofing attacks." }