Study on ARP Protocol and Network Security in Digital Manufacturing

Article Preview

Abstract:

Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol ARP virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the ARP Find virus source and virus removal methods, and finally putting forward effective measures to guard against ARP virus.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

191-195

Citation:

Online since:

January 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Xiren Xie (2004) Computer network (fourth edition). Dalian: Dalian University of Technology Press 1: 567-576.

Google Scholar

[2] Guisong Liu (2005) ARP protocol-based local area networks access control. Journal of University of Electronic Science and Technology of China (2): 21-25.

Google Scholar

[3] Pubing Zhang, Chengjun Liao (2001) Computer applications in the Internet spoofing attack and its prevention 21(1): 32-34.

Google Scholar

[4] Taiming Ren (2005) TCP/IP protocol and network programming. Wuhan University Press 5: 47-52.

Google Scholar

[5] Kenneth D. Reed (2004) TCP/IP Fundamentals (7th Edition). Electronic Industry Press 1: 241-252.

Google Scholar

[6] Bo Chen (2001) DoS Attacks and Countermeasures further study. Computer Engineering and Applications (1): 67-71.

Google Scholar

[7] Junzhou Luo (2004) TCP/IP protocol and network programming technology. Tsinghua University Press 1: 43-52.

Google Scholar

[8] Whalen S (2001) An Introduction to ARP Spoofing. Http: /www. Node99. Org/projects/ arpspoof / arpspoof. Pdf 04.

Google Scholar

[9] Comer D (2001) Internetworking Wit h TCP/IP Vol I: Principles, Protocols, and Architectures (Fourt h Edition). Beijing: Electronic Industry Press 4: 567-582.

Google Scholar

[10] Da Wang (2005) Network administrators' must-read - network security. Electronic Industry Press 11: 78-87.

Google Scholar

[11] Min Fan (2006) Electronic government information security and countermeasures. Mianyang Normal University 25(2): 91-94.

Google Scholar

[12] Cheng Dai Wei, Prague book (2005) Translation network security completely manual. Electronic Industry Press 10: 74-81.

Google Scholar