Computer Science ›› 2008, Vol. 35 ›› Issue (3): 52-54.
Previous Articles Next Articles
ZHANG Jie, WU Zhuang, LU Ti (Beijing Information Science & Technology University, Beijing 100085)
Online:
Published:
Abstract: When ARP spoofing is used as an attack mean, it brings serious threats to the security of LAN. This paper analyzes the defects of ARP protocol and the basic principle of ARP spoofing. A method is designed and accomplished to monitor ARP spoofing packets,
Key words: ARP protocol, ARP spoofing, Checking method
ZHANG Jie, WU Zhuang, LU Ti (Beijing Information Science & Technology University, Beijing 100085). [J].Computer Science, 2008, 35(3): 52-54.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2008/V35/I3/52
Cited