Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing |
Hao, Guo
(College of Science, Taiyuan University of Technology)
Tao, Guo (College of Science, Taiyuan University of Technology) |
1 | James Stanger, CIW Security Professional Study Guide [M], Peking: Publishing House of Electronics Industry, 2003 |
2 | Zheng Wenbing and Li Zhongcheng, “An Algorithm Against Attacks Based on ARP Spoofing [J]”, Journal of Southern Yangtze University , 2003, 2(6):576-578 |
3 | “Windows Packet Capture Library Online Document [EB/OL]”, http://winpcap.polito.it/docs/ , 2004 |
4 | Sean Whalen, “An Introduction to ARP Spoofing [EB/OL]”,http://packetstormsecurity.org/papers/prot ocols/, 2001 |