ARP Modification for Prevention of IP Spoofing |
Kang, Jung-Ha
(Department of Information and Communication Engineering, Hanbat National University)
Lee, Yang Sun (Division of Computer Engineering, Mokwon University) Kim, Jae Young (IT Convergence Technology Research Lab., Electronics and Telecommunications Research Institute) Kim, Eun-Gi (Department of Information and Communication Engineering, Hanbat National University) |
1 | D. C. Plummer, "An Ethernet address resolution protocol," RFC 826, 1982. |
2 | W. R. Stevens, TCP/IP Illustrated (Volume 1. The Protocols). Reading, MA: Addison-Wesley, 1994. |
3 | R. Braden, "Requirements for Internet hosts: communication layers," RFC 1122, 1989. |
4 | W. R. Stevens and G. R. Wright, TCP/IP Illustrated (Volume21. The Implementation). Reading, MA: Addison-Wesley, 1994. |
5 | Linux source code [Internet], Available: http://www.kernel.org/pub/linux/kernel/v2.6. |
6 | S. G. Bhirud and V. Katkar, "Light weight approach for IP-ARP spoofing detection and prevention," in Proceedings of the 2nd Asian Himalayas International Conference on Internet (AH-ICI), Kathmandu, Nepal, pp. 1-5, 2011. |
7 | W. Xing, Y. Zhao, and T. Li, "Research on the defense against ARP spoofing attacks based on WinPcaP," in Proceedings of the 2nd International Workshop on Education Technology and Computer Science (ETCS), Wuhan, China, pp. 762-765, 2010. |
8 | K. Wehrle, F. Pahlke, H. Ritter, D. Muller, and M. Bechler, The Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel. Upper Saddle River, NJ: Pearson Prentice Hall, 2004. |
9 | J. Corbet, Linux Device Drivers, 3rd ed. Beijing: O'Reilly, 2005. |
10 | A. Bremler-Barr and H. Levy, "Spoofing prevention method," in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, pp. 536-547, 2005. |
11 | K. Yaghmour, Building Embedded Linux Systems, 2nd ed. Sebastopol, CA: O'Reilly, 2008. |