Computer and Modernization ›› 2011, Vol. 1 ›› Issue (6): 193-6.doi: 10.3969/j.issn.1006-2475.2011.06.054

• 信息安全 • Previous Articles     Next Articles

Survey on ARP Spoofing

SHI Li-ping   

  1. Department of Information Technology, Guangdong Women′s Polytechnic College, Guangzhou 510450, China
  • Received:2011-02-23 Revised:1900-01-01 Online:2011-06-29 Published:2011-06-29

Abstract: Recently, ARP spoofing has become the primary threat to network security, ARP spoofingrelated research has become a hot topic in network security. This paper analyzes the principle of ARP protocol and ARP spoofing, describes the types and symptoms of ARP spoofing: cheat host, cheat gateway, cheat host and gateway. Some ARP spoofing detection and prevention methods are researched based on it, such as IP and MAC address matching, SACT detection, improvement or expanding ARP protocol and S_UARP agreement, analyzes these methods works, advantages and disadvantages. To improve and perfect the ARP protocol will become the development trend of ARP spoofing prevention.

Key words: ARP protocol, ARP spoofing, ARP spoofing detection, ARP spoofing prevention, network security