[1]
Xiren Xie (2004) Computer network (fourth edition). Dalian: Dalian University of Technology Press 1: 567-576.
Google Scholar
[2]
Guisong Liu (2005) ARP protocol-based local area networks access control. Journal of University of Electronic Science and Technology of China (2): 21-25.
Google Scholar
[3]
Pubing Zhang, Chengjun Liao (2001) Computer applications in the Internet spoofing attack and its prevention 21(1): 32-34.
Google Scholar
[4]
Taiming Ren (2005) TCP/IP protocol and network programming. Wuhan University Press 5: 47-52.
Google Scholar
[5]
Kenneth D. Reed (2004) TCP/IP Fundamentals (7th Edition). Electronic Industry Press 1: 241-252.
Google Scholar
[6]
Bo Chen (2001) DoS Attacks and Countermeasures further study. Computer Engineering and Applications (1): 67-71.
Google Scholar
[7]
Junzhou Luo (2004) TCP/IP protocol and network programming technology. Tsinghua University Press 1: 43-52.
Google Scholar
[8]
Whalen S (2001) An Introduction to ARP Spoofing. Http: /www. Node99. Org/projects/ arpspoof / arpspoof. Pdf 04.
Google Scholar
[9]
Comer D (2001) Internetworking Wit h TCP/IP Vol I: Principles, Protocols, and Architectures (Fourt h Edition). Beijing: Electronic Industry Press 4: 567-582.
Google Scholar
[10]
Da Wang (2005) Network administrators' must-read - network security. Electronic Industry Press 11: 78-87.
Google Scholar
[11]
Min Fan (2006) Electronic government information security and countermeasures. Mianyang Normal University 25(2): 91-94.
Google Scholar
[12]
Cheng Dai Wei, Prague book (2005) Translation network security completely manual. Electronic Industry Press 10: 74-81.
Google Scholar