TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
A secure address resolution protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Evaluation of network blocking algorithm based on ARP spoofing and its application
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Detecting ARP spoofing: an active technique
ICISS'05 Proceedings of the First international conference on Information Systems Security
The communication unit of measuring device in power engineering
WSEAS TRANSACTIONS on COMMUNICATIONS
Hi-index | 0.00 |
During the network communication process, attacker carry on ARP spoofing by using the disadvantage of the ARP(Address Resolution Protocol) protocol, this phenomenon is seriously threaten the LAN security. This paper will introduce the commonly used ARP spoofing methods such as internal/external network sniffing, interception, malicious attack and so on. It presents the Matching IP method, Data monitor method, Echo time method, ARP response analysis method, software tools detecting method as well as the new method of ARP cache updating, using switching equipment to control and other strategy and presents the algorithm to keep ARP spoofing away and maintain network security.