The research of ARP Spoofing protection schema
碩士 === 大同大學 === 資訊工程學系(所) === 99 === IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can e...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/06503170214871908277 |
id |
ndltd-TW-099TTU05392006 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-099TTU053920062015-10-13T19:19:58Z http://ndltd.ncl.edu.tw/handle/06503170214871908277 The research of ARP Spoofing protection schema ARP Spoofing 防護機制研究 Cheng-Sheng Wang 王建盛 碩士 大同大學 資訊工程學系(所) 99 IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can effectively protect against ARP Spoofing attacks available yet. This paper will propose an ARP query process that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN, which can effectively protect against ARP Spoofing attacks without an increase of investments in personnel and equipments or change of network structures Jin-Cherng Lin 林金城 2010 學位論文 ; thesis 17 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 大同大學 === 資訊工程學系(所) === 99 === IP over Ethernet is one of the world's most widely used network structure; however, ARP Spoofing attacks still remain as a serious security threat on the local area network. Despite the seriousness, there is no protective mechanism (or system) that can effectively protect against ARP Spoofing attacks available yet.
This paper will propose an ARP query process that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN, which can effectively protect against ARP Spoofing attacks without an increase of investments in personnel and equipments or change of network structures
|
author2 |
Jin-Cherng Lin |
author_facet |
Jin-Cherng Lin Cheng-Sheng Wang 王建盛 |
author |
Cheng-Sheng Wang 王建盛 |
spellingShingle |
Cheng-Sheng Wang 王建盛 The research of ARP Spoofing protection schema |
author_sort |
Cheng-Sheng Wang |
title |
The research of ARP Spoofing protection schema |
title_short |
The research of ARP Spoofing protection schema |
title_full |
The research of ARP Spoofing protection schema |
title_fullStr |
The research of ARP Spoofing protection schema |
title_full_unstemmed |
The research of ARP Spoofing protection schema |
title_sort |
research of arp spoofing protection schema |
publishDate |
2010 |
url |
http://ndltd.ncl.edu.tw/handle/06503170214871908277 |
work_keys_str_mv |
AT chengshengwang theresearchofarpspoofingprotectionschema AT wángjiànshèng theresearchofarpspoofingprotectionschema AT chengshengwang arpspoofingfánghùjīzhìyánjiū AT wángjiànshèng arpspoofingfánghùjīzhìyánjiū AT chengshengwang researchofarpspoofingprotectionschema AT wángjiànshèng researchofarpspoofingprotectionschema |
_version_ |
1718041988167630848 |