Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing


Guo Hao, Guo Tao, Journal of Information Processing Systems Vol. 5, No. 3, pp. 131-134, Sep. 2009  

10.3745/JIPS.2009.5.3.131
Keywords: Man-in-the-middle Attack, ARP Spoofing, Session Hijack
Fulltext:

Abstract

Man-in-the-middle attack is used wildly as a method of attacking the network. To discoverhow this type of attack works, this paper describes a method of man-in-the-middle attack based onARP spoofing, and proposes a method of preventing such attacks.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Hao, G. & Tao, G. (2009). Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing. Journal of Information Processing Systems, 5(3), 131-134. DOI: 10.3745/JIPS.2009.5.3.131.

[IEEE Style]
G. Hao and G. Tao, "Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing," Journal of Information Processing Systems, vol. 5, no. 3, pp. 131-134, 2009. DOI: 10.3745/JIPS.2009.5.3.131.

[ACM Style]
Guo Hao and Guo Tao. 2009. Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing. Journal of Information Processing Systems, 5, 3, (2009), 131-134. DOI: 10.3745/JIPS.2009.5.3.131.