IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the network, not from externally. This study concerns itself with how a Manager can integrate IP addresses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze. © Springer-Verlag 2004.
CITATION STYLE
Kwon, K., Ahn, S., & Chung, J. W. (2004). Network security management using ARP spoofing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 142–149. https://doi.org/10.1007/978-3-540-24707-4_18
Mendeley helps you to discover research relevant for your work.