ARP Spoofing Detection and guarding algorithm
暂无分享,去创建一个
During the network communication process, attacker carry on ARP spoofing by using the disadvantage of the ARP(Address Resolution Protocol) protocol, this phenomenon seriously threatens the LAN security. This paper will introduce the commonly used ARP spoofing methods such as internal/external network sniffing, interception, malicious attack and so on. It presents the Matching IP method, Data monitor method, Echo time method, ARP response analysis method, software tools detecting method as well as the new method of ARP cache updating, using switching equipment to control and other strategy and presents the algorithm to keep ARP spoofing away and maintain network security.
[1] Won-Joo Hwang,et al. JOINT OPPORTUNISTIC SCHEDULING AND POWER CONTROL FOR AD HOC NETWORKS , 2006 .