ARP Fraudulence and Strategy in Local Area Network

Article Preview

Abstract:

This article has analyzed the local area network Address Resolution Protocol principle of work and the safe hidden danger, proposed the Address Resolution Protocol deceit's design realizes the method, and has analyzed its harm through the example, finally has made the further discussion to the procedure extendibility and the effective protection method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1681-1684

Citation:

Online since:

October 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] GAI Linyun, TAO Fei. Based on ARP Agreement Attack and Guard Measure[J]. China Information Security, 2007(4): 79-80.

Google Scholar

[2] HUANG Tian-fu, BAI Guang-wei. Method Against ARP Spoofing Based on Improved Protocol Mechanism[J]. Computer Engineering, 2008, 34(14): 168-170.

Google Scholar

[3] WANG YAN, ZHANG XINGANG. Analysis of Principle and Protecting Method Based on ARP Spoofing[J]. Control & Automation, 2007, 23(36): 72-74.

Google Scholar

[4] ZHENG Wen-bing, LI Chen-zhong. An Algorithm Against Attacks Based on ARP Spoofing[J]. Journal of Southern Yangtze University: Natural Science Edition, 2003, 2(6): 574-577.

Google Scholar

[5] XU Guo-tian. Research on Security Issues of Address Resolution Protocol[J]. Journal of Liaoning University(Natural Sciences Edition), 2009, 36(2): 151-153.

Google Scholar

[6] CHEN Ying, MA Hong-tao. Attacks on ARP in Local Area Network and the Solutions[J]. China Safety Science Journal, 2007, 17(7): 126-131.

Google Scholar

[7] Xiang Xin; Li ZhiShu. The Principle and Implement of Packet Sniff by APR Spoof[J]. Journal of Sichuan University (Natural Science Edition), 2005, 42(4): 714-718.

Google Scholar

[8] CUI Bei-liang, YANG Xiao-jian. On protection against ARP attack within campus network[J]. Journal of Nanjing University of Technology, 2007, 29(5): 78-81.

Google Scholar