[1]
GAI Linyun, TAO Fei. Based on ARP Agreement Attack and Guard Measure[J]. China Information Security, 2007(4): 79-80.
Google Scholar
[2]
HUANG Tian-fu, BAI Guang-wei. Method Against ARP Spoofing Based on Improved Protocol Mechanism[J]. Computer Engineering, 2008, 34(14): 168-170.
Google Scholar
[3]
WANG YAN, ZHANG XINGANG. Analysis of Principle and Protecting Method Based on ARP Spoofing[J]. Control & Automation, 2007, 23(36): 72-74.
Google Scholar
[4]
ZHENG Wen-bing, LI Chen-zhong. An Algorithm Against Attacks Based on ARP Spoofing[J]. Journal of Southern Yangtze University: Natural Science Edition, 2003, 2(6): 574-577.
Google Scholar
[5]
XU Guo-tian. Research on Security Issues of Address Resolution Protocol[J]. Journal of Liaoning University(Natural Sciences Edition), 2009, 36(2): 151-153.
Google Scholar
[6]
CHEN Ying, MA Hong-tao. Attacks on ARP in Local Area Network and the Solutions[J]. China Safety Science Journal, 2007, 17(7): 126-131.
Google Scholar
[7]
Xiang Xin; Li ZhiShu. The Principle and Implement of Packet Sniff by APR Spoof[J]. Journal of Sichuan University (Natural Science Edition), 2005, 42(4): 714-718.
Google Scholar
[8]
CUI Bei-liang, YANG Xiao-jian. On protection against ARP attack within campus network[J]. Journal of Nanjing University of Technology, 2007, 29(5): 78-81.
Google Scholar