Research on the defense against ARP spoofing attacks based on Winpcap

18Citations
Citations of this article
18Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Based on the study of the existing methods and the WinPcaP, aimed with the ARP spoofing attacks achieved mainly by disguising the gateway, the thesis presents a method of defending ARP spoofing attacks based on WinPcaP. The method is: Setting filtering rules by filtering mechanisms of the WinPcaP, and the system just captures the ARP packets flowing through the local card, and then sends the packets to the analysis module; In the analysis module, the system parses out the IP address and MAC address from the data packets, and sends them to the checking module; In the checking module, the system first judges whether the last number of the IP address is one, if not, the system gives up treating the packet, otherwise compares the IP/MAC to the right IP/MAC and sends the result to the response module; In the response module, if judging there exists ARP spoofing attacks, the system sends information to the users, modifies the ARP cache table and stores the information to the database server. © 2010 IEEE.

Cite

CITATION STYLE

APA

Xing, W., Zhao, Y., & Li, T. (2010). Research on the defense against ARP spoofing attacks based on Winpcap. In 2nd International Workshop on Education Technology and Computer Science, ETCS 2010 (Vol. 1, pp. 762–765). https://doi.org/10.1109/ETCS.2010.75

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free