ARP spoofing

Known as: APR, ARP flooding, ARP poison 
In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
In today's competitive world consideration of maintaining the security of information is must. Nowadays LAN is generally the most… (More)
Is this relevant?
2013
2013
Today, there are an increasing number of attack technologies among which ARP spoofing attack is considered as one of the easiest… (More)
  • figure 1
  • figure 3
  • figure 2
  • figure 5
  • table I
Is this relevant?
2011
2011
Address Resolution Protocol (ARP) based attacks are caused by compromised hosts in the LAN and mainly involve spoofing with… (More)
  • figure 1
  • table II
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Heavily used intra-domain protocols (like IP, ARP) do not have protection mechanism against malicious activities by network… (More)
  • figure I
Is this relevant?
2011
2011
A network Intrusion Detection System (IDS) is a device or software that monitors network activities and raises alerts on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
The address resolution protocol (ARP) has proven to work well under regular circumstances, but it was not designed to cope with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2010
2010
As one of powerful and light weight Network Intrusion Detection System, Snort has good expansibility and transplantability, and… (More)
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Identifying weak points of network systems and protecting them (before attackers or hackers detect and use our data to attack our… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2005
2005
The Address Resolution Protocol (ARP) due to its statelessness and lack of an authentication mechanism for verifying the identity… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Tapping into the communication between two hosts on a LAN has become quite simple thanks to tools that can be downloaded from the… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?