Please wait a minute...
Computer & Telecommunication  2015, Vol. 1 Issue (1-2): 58-69    DOI:
Current Issue | Archive | Adv Search |
Analysis on the Defense Strategy of ARPAttack
Chi Xinjie
The Central Academy of Drama
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  ARP (Address Resolution Protocol) is one of the commonly used network protocol in TCP/IP network. Its function is to obtain the physical address based on the host IP address. However, ARP attack is also a common mean of local area network attack for the protocol characteristics, bringing serious security hidden danger to the network. According to the characteristics of ARP protocol, the ARP attack means are analyzed, and different solution strategies are given according to different kinds of attack.
Key wordslocal area network/network security/IP address/ MAC address      ARP spoofing/ARP scanning      
Published: 08 November 2017
:  TP393  

Cite this article:

Chi Xinjie. Analysis on the Defense Strategy of ARPAttack. Computer & Telecommunication, 2015, 1(1-2): 58-69.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2015/V1/I1-2/58

[1] LI Jia-Qi SU Li-na. Research on Science and Technology Information Service platform of Comprehensive Sci-tech Journals based on Mobile Interconnection and its Architecture[J]. 电脑与电信, 2019, 1(6): 42-46.
[2] GAO Pan LIN Li. Discussion on the Omni-directional Defense for Virus Defense[J]. 电脑与电信, 2019, 1(5): 45-47.
[3] HUANG Xiao-hua. Analysis on the Head of the Web[J]. 电脑与电信, 2019, 1(5): 75-77.
[4] XIN Yan-shuang CHEN Si HAN Xiu-yuan. A Tele-collaboration Implementation Scheme Based on ICE[J]. 电脑与电信, 2019, 1(4): 61-65.
[5] FANG Yong. Research on the IPv6 Remote Network Monitoring and Communication System[J]. 电脑与电信, 2019, 1(3): 62-65.
[6] LIU Jin YAN Cong YUAN Xi. Research on Security Baseline Configuration Verification Based on Cloud Computing Virtualization Platform[J]. 电脑与电信, 2019, 1(1-2): 28-34.
[7] Wang Gang. A Congestion Control Mechanism for Improving Fairness of TCP and UDP Data Flow[J]. 电脑与电信, 2018, 1(12): 70-73.
[8] CHEN Si-qi. Fine Grained Image Localization Based on Bilinear Convolutional Neural Network [J]. 电脑与电信, 2018, 1(11): 78-80.
[9] ZHENG Ai-yuan. Research on Evaluation Function Based on Indexin Fuzzy Network[J]. 电脑与电信, 2018, 1(9): 32-35.
[10] WANG Biao, TAN Si-min, RUAN Yuan-hua, XIE Tian-jie. Research on Evaluation Index System of Cloud Computing Service Quality[J]. 电脑与电信, 2018, 1(4): 4-6.
[11] GUAN Yu. A RFID Authentication Protocol[J]. 电脑与电信, 2018, 1(4): 31-33.
[12] ZHANG Yun. Design of Intelligent Supervision and Evaluation System Based on Cloudview[J]. 电脑与电信, 2018, 1(4): 43-46.
[13] FANG Zi-ling, KUANG Fang-jun. Data Analysis on NetEase Ballad Lyrics Based on Python[J]. 电脑与电信, 2018, 1(4): 53-56.
[14] CHENWen-yao. IDC Core Network Design for Telecom Carriers[J]. 电脑与电信, 2018, 1(3): 40-42.
[15] LU Yu-fan, WANG Xun. Research on the Hadoop Platform Safety Reinforcement Based on the Kerberos Authentication Mechanism[J]. 电脑与电信, 2018, 1(1-2): 47-49.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd