Network security management using ARP spoofing

18Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the network, not from externally. This study concerns itself with how a Manager can integrate IP addresses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Kwon, K., Ahn, S., & Chung, J. W. (2004). Network security management using ARP spoofing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3043, 142–149. https://doi.org/10.1007/978-3-540-24707-4_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free