Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing

Guo Hao and Guo Tao
Volume: 5, No: 3, Page: 131 ~ 134, Year: 2009
10.3745/JIPS.2009.5.3.131
Keywords: Man-in-the-middle attack, ARP Spoofing, Session Hijack
Full Text:

Abstract
Man-in-the-middle attack is used wildly as a method of attacking the network. To discoverhow this type of attack works, this paper describes a method of man-in-the-middle attack based onARP spoofing, and proposes a method of preventing such attacks.

Article Statistics
Multiple requests among the same broswer session are counted as one view (or download).
If you mouse over a chart, a box will show the data point's value.


Cite this article
IEEE Style
Guo Hao and Guo Tao, "Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing," Journal of Information Processing Systems, vol. 5, no. 3, pp. 131~134, 2009. DOI: 10.3745/JIPS.2009.5.3.131.

ACM Style
Guo Hao and Guo Tao, "Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing," Journal of Information Processing Systems, 5, 3, (2009), 131~134. DOI: 10.3745/JIPS.2009.5.3.131.