1 |
Address Resolution Protocol, RFC 826: http://www.ietf.org/rfc/rfc903.txt
|
2 |
Hastings, N.E, TCP/IP spoofing fundamentals, Computers and Communications, 1996, Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference (1996) 218-224
|
3 |
M. Laubach. 'Classical IP and ARP over ATM' RFC1577, Jan.1994
|
4 |
최원우, 정진욱, 안성진, 'A Study on Network Security Problems Analysis of ARP Mechanism', 한국 응용 수학회, Aug 2004
|
5 |
William Stallings, 'Network Security Essentials Application and Standards Second Edition', 2002
|
6 |
정진욱, 김현철, 조상홍, '컴퓨터 네트워크' 생능 출판사, 2002
|
7 |
S. Kent and R. Atkinson, Security architecture for th Internet Protocol, RFC 2401, 1998
|
8 |
Fred Halsall, 'Data Communications, Computer Networks and Open Systems', ADDISON WESLEY, 1996
|
9 |
Miscellaneous Security: hacking tools. http://www.experts-exchange.com/Security/Misc/Q_21287353.html
|
10 |
Sanjeev Kumar, IEEE Senior Member, USA, Impact of Distributed Denial of Service (DDoS) Due to ARP Storm
|
11 |
DHCP Relay Agent Information Option (RFC 3046): http://www.ietf.org/rfc/rfc3046.txt
|
12 |
A. Householder and B. King. Securing an internet name server. http://www.cert.org/archive
|
13 |
Dynamic Host Configuration Protocol (RFC 1531): http://www.ietf.org/rfc/rfc1531.txt
|