Network Security Management Using ARP Spoofing

作者: Kyohyeok Kwon , Seongjin Ahn , Jin Wook Chung

DOI: 10.1007/978-3-540-24707-4_18

关键词:

摘要: … hosts from using the ARP Spoofing, and fix the dynamically updated ARP cache table to deactivate the ARP Spoofing. The Agent system sends the ARP Request message containing …

参考文章(4)
M. Laubach, J. Halpern, Classical IP and ARP over ATM RFC. ,vol. 1577, pp. 1- 17 ,(1994)
H. Ishibashi, N. Yamai, K. Abe, T. Matsuura, A protection method against unauthorized access and address spoofing for open network access systems pacific rim conference on communications, computers and signal processing. ,vol. 1, pp. 10- 13 ,(2001) , 10.1109/PACRIM.2001.953510
N.E. Hastings, P.A. McLean, TCP/IP spoofing fundamentals international phoenix conference on computers and communications. pp. 218- 224 ,(1996) , 10.1109/PCCC.1996.493637
N. Oguchi, Y.-M. Chen, J. Ogawa, T. Tsuruoka, T. Taniguchi, S. Nojima, RISP: address resolution protocol in network layer local computer networks. pp. 99- 108 ,(1998) , 10.1109/LCN.1998.727651