透過您的圖書館登入
IP:216.73.216.209
  • 期刊

Security Analysis and Simulation Experiment of ARP Protocol Vulnerability

摘要


Although TCP/IP protocol is widely used, its security was not prioritized during its development. This paper primarily examines the fundamental workings of ARP protocol and its security vulnerabilities. Through network simulation, we demonstrate the process of ARP spoofing and flooding attacks while using Wireshark packet capture tool to analyze data packets in order to gain a deeper understanding of these attacks. Finally, we propose corresponding preventive measures. Conducting simulation experiments is an economical and practical method for analyzing network protocol vulnerabilities as it can identify security issues at a low cost and provide solutions.

參考文獻


Xu Shuang, Su Yu. Analysis of Network protocol [M]. China Water Resources and Hydropower Press, 2016.9.
Li Long, Research and application of Attack and defense Technology based on TCP/IP protocol vulnerabilities [D]. Northeastern University,2013.
Bian Jiang-hao, Research and implementation of ARP spoofing detection and defense method [D]. Yunnan: Kunming University of Science and Technology Press,2015,5.
Zhao Mengna, Design and Implementation of ARP Attack System Based on Campus Network [D]. Guangdong: South China University of Technology Press,2013,11.
Guo Jie, Research on ARP spoofing Attack and Prevention Strategy [J]. China Communications Tianjin Harbor Engineering Design Institute Co., LTD.,2018,5.

延伸閱讀