Computer Science ›› 2008, Vol. 35 ›› Issue (3): 52-54.

Previous Articles     Next Articles

ZHANG Jie, WU Zhuang, LU Ti (Beijing Information Science & Technology University, Beijing 100085)   

  • Online:2018-11-16 Published:2018-11-16

Abstract: When ARP spoofing is used as an attack mean, it brings serious threats to the security of LAN. This paper analyzes the defects of ARP protocol and the basic principle of ARP spoofing. A method is designed and accomplished to monitor ARP spoofing packets,

Key words: ARP protocol, ARP spoofing, Checking method

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!