Research on an algorithm of active detecting and resisting ARP attack

被引:0
|
作者
Lin, Hong-Gang [1 ]
Chen, Lin [1 ]
Wang, Biao [2 ]
Wu, Yan-Wei [3 ]
机构
[1] Dept. of Network Eng., Chengdu Univ. of Info. Technol., Chengdu 610225, China
[2] Dept. of Info. and Technol., Univ. of International Relations, Beijing 100091, China
[3] Sichuan Petroleum Administration, Chengdu 610065, China
来源
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) | 2008年 / 40卷 / 03期
关键词
Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:143 / 149
相关论文
共 50 条
  • [31] A novel DDoS attack detecting algorithm based on the continuous wavelet transform
    Yang, XY
    Liu, Y
    Zeng, M
    Shi, Y
    CONTENT COMPUTING, PROCEEDINGS, 2004, 3309 : 173 - 181
  • [32] A Novel Algorithm for Detecting Node Clone Attack in Wireless Sensor Networks
    Patil, Deepali S.
    Patil, Shailaja C.
    2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
  • [33] A social networks routing algorithm of resisting sybil attack based on P2P
    Jia, Xiaoqiang
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2016, 16 (04) : 877 - 898
  • [34] Image digital watermarking algorithm in DCT domain for resisting brightness-and-contrast adjusting attack
    Li, X.-D. (leesheedong@163.com), 1600, Board of Optronics Lasers, No. 47 Yang-Liu-Qing Ying-Jian Road, Tian-Jin City, 300380, China (24):
  • [35] Real-time similar trajectory generation algorithm for resisting trajectory difference identification attack
    Zhang L.
    Ma C.
    Yang S.
    Zheng X.
    Ma, Chunguang (machunguang@hrbeu.edu.cn), 2017, Editorial Board of Journal of Harbin Engineering (38): : 1173 - 1178
  • [36] Detecting and Avoiding of Worm Hole Attack and CollaborativeBlackhole attack on MANET using Trusted AODV Routing Algorithm
    Arya, Neeraj
    Singh, Upendra
    Singh, Sushma
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [37] Analysis of ARP Spoofing Attack and Defense Strategies
    Xu, Shuxin
    Zhang, Weigang
    ASIA-PACIFIC MANAGEMENT AND ENGINEERING CONFERENCE (APME 2014), 2014, : 193 - 198
  • [38] An detection algorithm for ARP man-in-the-middle attack based on data packet forwarding behavior characteristics
    Ren, Ming
    Tian, Yanhui
    Kong, Siqi
    Zhou, Dali
    Li, Danping
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1599 - 1604
  • [39] Research on predicting heart attack through active learning
    Yuan, Peng
    2021 2ND INTERNATIONAL CONFERENCE ON BIG DATA & ARTIFICIAL INTELLIGENCE & SOFTWARE ENGINEERING (ICBASE 2021), 2021, : 12 - 18
  • [40] A defense algorithm against an active network attack with minimum cost
    Ma X.
    Ma, Xiao (maxiao6566@163.com), 1600, Editorial Board of Journal of Harbin Engineering (41): : 1405 - 1410