Research on an algorithm of active detecting and resisting ARP attack

被引:0
|
作者
Lin, Hong-Gang [1 ]
Chen, Lin [1 ]
Wang, Biao [2 ]
Wu, Yan-Wei [3 ]
机构
[1] Dept. of Network Eng., Chengdu Univ. of Info. Technol., Chengdu 610225, China
[2] Dept. of Info. and Technol., Univ. of International Relations, Beijing 100091, China
[3] Sichuan Petroleum Administration, Chengdu 610065, China
来源
Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition) | 2008年 / 40卷 / 03期
关键词
Network security;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:143 / 149
相关论文
共 50 条
  • [41] Detecting bioterror attack
    Bicout, DJ
    EMERGING INFECTIOUS DISEASES, 2004, 10 (08) : 1504 - 1505
  • [42] Watermarking scheme capable of resisting sensitivity attack
    Zhang, Xinpeng
    Wang, Shuozhong
    IEEE SIGNAL PROCESSING LETTERS, 2007, 14 (02) : 125 - 128
  • [43] A new steganographic method resisting statistical attack
    Kong, XW
    Liu, C
    You, XH
    Guo, YQ
    2004 7TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING PROCEEDINGS, VOLS 1-3, 2004, : 1092 - 1095
  • [44] THE NEA UNDER ATTACK - RESISTING THE BIG CHILL
    HACKNEY, S
    ACADEME-BULLETIN OF THE AAUP, 1990, 76 (04): : 14 - 17
  • [45] Implementation of the K-Nearest Neighbor Algorithm for Detecting Heart Attack Disease
    Sitanggang, Delima
    Indra, Evta
    Gulo, Juan Hardoni
    Turnip, Mardi
    INTERNETWORKING INDONESIA, 2021, 13 (02): : 35 - 41
  • [46] A comparative analysis of machine learning techniques for detecting probing attack with SHAP algorithm
    Rabbi, Fazla
    Hossain, Niamat Ullah Ibne
    Das, Saikat
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 271
  • [47] Optimization of Elliptic Curve Cryptography Resisting Power Attack Scalar Multiplication Algorithm in Security System on Chip
    Wang, Xiang
    Wang, Liping
    Bai, Yuanchen
    He, Zhenxue
    Wang, Tao
    Xu, Bin
    Zhang, He
    Wang, Xiaocui
    Zhou, Cheng
    Wang, Weike
    Du, Pei
    IEEE 12TH INT CONF UBIQUITOUS INTELLIGENCE & COMP/IEEE 12TH INT CONF ADV & TRUSTED COMP/IEEE 15TH INT CONF SCALABLE COMP & COMMUN/IEEE INT CONF CLOUD & BIG DATA COMP/IEEE INT CONF INTERNET PEOPLE AND ASSOCIATED SYMPOSIA/WORKSHOPS, 2015, : 1397 - 1401
  • [48] Detecting Research Teams through Active Collaborative Participation
    Wang, Chun-Chieh
    Chen, Dar-Zen
    Kuan, Chung-Huei
    Hsueh, Chao-Chih
    Proceedings of the Association for Information Science and Technology, 2024, 61 (01) : 1123 - 1125
  • [49] The Defense Against ARP Spoofing Attack Using Semi-Static ARP Cache Table
    Data, Mahendra
    PROCEEDINGS OF 2018 3RD INTERNATIONAL CONFERENCE ON SUSTAINABLE INFORMATION ENGINEERING AND TECHNOLOGY (SIET 2018), 2018, : 206 - 210
  • [50] An Interactive Visualization Tool for Teaching ARP Spoofing Attack
    Scott, Brandon
    Xu, Jinsheng
    Zhang, Jinghua
    Brown, Ariana
    Clark, Erica
    Yuan, Xiaohong
    Yu, Anna
    Williams, Kenneth
    2017 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE), 2017,