Malicious JavaScript Insertion through ARP Poisoning Attacks

  • Authors:
  • Bojan Zdrnja

  • Affiliations:
  • INFIGO IS

  • Venue:
  • IEEE Security and Privacy
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

Details about ARP poisoning attacks as well as countermeasures have been known for years. Yet, most networks are still vulnerable to these attacks because they haven't implemented defenses. This article explains how ARP poisoning attacks work and analyzes how such attacks are exploited in the wild against Web hosting companies, where the ARP poisoning attacks are used for real-time network traffic modification.