Filters








1 Hit in 0.033 sec

Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing

Guo Hao, Guo Tao
2009 Journal of Information Processing Systems  
Man-in-the-middle attack is used wildly as a method of attacking the network. To discover how this type of attack works, this paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes a method of preventing such attacks. Keywords: Man-in-the-middle attack, ARP Spoofing, Session Hijack Principle of Man-in-the-middle Attack Based on ARP Spoofing Three steps are necessary for a complete Man-in-themiddle attack based on ARP spoofing. To use ARP spoofing, the Attacker
more » ... fing, the Attacker inserts himself in the center of two legitimate hosts, at which point the communication between the two legitimate hosts will be broken, changing it into:
doi:10.3745/jips.2009.5.3.131 fatcat:ny6j2pailzcnvb5fsnbh6nge4i