The research of ARP Spoofing protection schema

碩士 === 大同大學 === 資訊工程學系(所) === 99 === IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can e...

Full description

Bibliographic Details
Main Authors: Cheng-Sheng Wang, 王建盛
Other Authors: Jin-Cherng Lin
Format: Others
Language:zh-TW
Published: 2010
Online Access:http://ndltd.ncl.edu.tw/handle/06503170214871908277
id ndltd-TW-099TTU05392006
record_format oai_dc
spelling ndltd-TW-099TTU053920062015-10-13T19:19:58Z http://ndltd.ncl.edu.tw/handle/06503170214871908277 The research of ARP Spoofing protection schema ARP Spoofing 防護機制研究 Cheng-Sheng Wang 王建盛 碩士 大同大學 資訊工程學系(所) 99 IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can effectively protect against ARP Spoofing attacks available yet. This paper will propose an ARP query process that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN, which can effectively protect against ARP Spoofing attacks without an increase of investments in personnel and equipments or change of network structures Jin-Cherng Lin 林金城 2010 學位論文 ; thesis 17 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 大同大學 === 資訊工程學系(所) === 99 === IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can effectively protect against ARP Spoofing attacks available yet. This paper will propose an ARP query process that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN, which can effectively protect against ARP Spoofing attacks without an increase of investments in personnel and equipments or change of network structures
author2 Jin-Cherng Lin
author_facet Jin-Cherng Lin
Cheng-Sheng Wang
王建盛
author Cheng-Sheng Wang
王建盛
spellingShingle Cheng-Sheng Wang
王建盛
The research of ARP Spoofing protection schema
author_sort Cheng-Sheng Wang
title The research of ARP Spoofing protection schema
title_short The research of ARP Spoofing protection schema
title_full The research of ARP Spoofing protection schema
title_fullStr The research of ARP Spoofing protection schema
title_full_unstemmed The research of ARP Spoofing protection schema
title_sort research of arp spoofing protection schema
publishDate 2010
url http://ndltd.ncl.edu.tw/handle/06503170214871908277
work_keys_str_mv AT chengshengwang theresearchofarpspoofingprotectionschema
AT wángjiànshèng theresearchofarpspoofingprotectionschema
AT chengshengwang arpspoofingfánghùjīzhìyánjiū
AT wángjiànshèng arpspoofingfánghùjīzhìyánjiū
AT chengshengwang researchofarpspoofingprotectionschema
AT wángjiànshèng researchofarpspoofingprotectionschema
_version_ 1718041988167630848