相似文献/References:
[1]潘晓君.基于缓存超时的ARP欺骗攻击协议的研究[J].计算机技术与发展,2009,(10):167.
PAN Xiao-jun.Research of ARP Spoofing Attack Protocol Based on Cache Overtime[J].,2009,(06):167.
[2]夏磊 杨善林 褚伟.基于Libpcap的局域网ARP攻击与防御系统[J].计算机技术与发展,2009,(03):164.
XIA Lei,YANG Shan-lin,CHU Wei.ARP Attacks and Defense System Based on Libpcap[J].,2009,(06):164.
[3]赵晓峰 汪精明 王平水.园区网ARP欺骗攻击防御模式设计与实现[J].计算机技术与发展,2007,(07):152.
ZHAO Xiao-feng,WANG Jing-ming,WANG Ping-shui.Design and Implementation of Defense System for ARP Spoofing in Campus Network[J].,2007,(06):152.
[4]王晓妮,韩建刚.基于免疫网络的ARP攻击防御方案研究与实施[J].计算机技术与发展,2019,29(04):95.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 020]
WANG Xiao-ni,HAN Jian-gang.Research and Implementation of ARP Attack and Defense Scheme Based on Immune Network[J].,2019,29(06):95.[doi:10. 3969 / j. issn. 1673-629X. 2019. 04. 020]