Browse > Article
http://dx.doi.org/10.3745/JIPS.2009.5.3.131

Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing  

Hao, Guo (College of Science, Taiyuan University of Technology)
Tao, Guo (College of Science, Taiyuan University of Technology)
Publication Information
Journal of Information Processing Systems / v.5, no.3, 2009 , pp. 131-134 More about this Journal
Abstract
Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks.
Keywords
Man-in-the-middle attack; ARP Spoofing; Session Hijack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 James Stanger, CIW Security Professional Study Guide [M], Peking: Publishing House of Electronics Industry, 2003
2 Zheng Wenbing and Li Zhongcheng, “An Algorithm Against Attacks Based on ARP Spoofing [J]”, Journal of Southern Yangtze University , 2003, 2(6):576-578
3 “Windows Packet Capture Library Online Document [EB/OL]”, http://winpcap.polito.it/docs/ , 2004
4 Sean Whalen, “An Introduction to ARP Spoofing [EB/OL]”,http://packetstormsecurity.org/papers/prot ocols/, 2001