1 |
Asia e-News. Security frontline, 3100 million threats per day, and time of strife, war without gunfire [Internet]. Available: http://view.asiae.co.kr/news/view.htm?idxno=2016043017134438097.
|
2 |
D. I. Yang, Introduction to Information Security and practice-network hacking and security, Seoul, Korea: Hanbit Media Inc., ch. 8, pp. 260-263, 2013.
|
3 |
KISA. ARP Spoofing Attacks and Countermeasures Analysis Report [Internet]. Available: http://skyand96.com/128.
|
4 |
J. H. Kang etc., "ARP Modification for Prevention of IP Spoofing," Journal of Korea Institute of Information and Communication Engineering, vol. 12, no. 3, pp. 154-160, Sep. 2014.
|
5 |
B. K. Ko etc., "A Design of Network Management System for Efficiently Isolating Devices Infected with ARP Spoofing Virus," Journal of Korea Institute of Information and Communication Engineering, vol. 17, no. 3, pp. 641-648, Mar. 2013.
DOI
|
6 |
C. Sanders, Packet analysis practice using the Wireshark, Gyeonggi-do, Korea: ACORN Pub., 2012.
|
7 |
Naver Blog. Introduction to the sniffing tools Dsniff [Internet]. Available: http://kkn1220.tistory.com/72.
|
8 |
H. S. Kang etc., "Defense Technique against Spoofing Attacks using Automated Management of ARP Table for Virtual Machine in Cloud Computing Environment," KIISE 2015 Winter Conference Proceeding, pp. 857-859, 2015.
|