References
- James Stanger, CIW Security Professional Study Guide [M], Peking: Publishing House of Electronics Industry, 2003
- Zheng Wenbing and Li Zhongcheng, “An Algorithm Against Attacks Based on ARP Spoofing [J]”, Journal of Southern Yangtze University , 2003, 2(6):576-578
- Sean Whalen, “An Introduction to ARP Spoofing [EB/OL]”,http://packetstormsecurity.org/papers/prot ocols/, 2001
- “Windows Packet Capture Library Online Document [EB/OL]”, http://winpcap.polito.it/docs/ , 2004
Cited by
- A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus vol.17, pp.3, 2013, https://doi.org/10.6109/jkiice.2013.17.3.641
- A Survey of Man In The Middle Attacks vol.18, pp.3, 2016, https://doi.org/10.1109/COMST.2016.2548426