DOI QR코드

DOI QR Code

Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing

  • Hao, Guo (College of Science, Taiyuan University of Technology) ;
  • Tao, Guo (College of Science, Taiyuan University of Technology)
  • Published : 2009.09.30

Abstract

Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.

Keywords

References

  1. James Stanger, CIW Security Professional Study Guide [M], Peking: Publishing House of Electronics Industry, 2003
  2. Zheng Wenbing and Li Zhongcheng, “An Algorithm Against Attacks Based on ARP Spoofing [J]”, Journal of Southern Yangtze University , 2003, 2(6):576-578
  3. Sean Whalen, “An Introduction to ARP Spoofing [EB/OL]”,http://packetstormsecurity.org/papers/prot ocols/, 2001
  4. “Windows Packet Capture Library Online Document [EB/OL]”, http://winpcap.polito.it/docs/ , 2004

Cited by

  1. A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus vol.17, pp.3, 2013, https://doi.org/10.6109/jkiice.2013.17.3.641
  2. A Survey of Man In The Middle Attacks vol.18, pp.3, 2016, https://doi.org/10.1109/COMST.2016.2548426