Fig 1 - uploaded by Md. Sadek Ferdous
Content may be subject to copyright.
Format of ARP Request or Reply Packet When Used on an Ethernet
Source publication
ARP cache poisoning based attack has been one of the most successful attack methods for years inside a LAN. There are a few solutions to detect and sometimes prevent an ARP based attack but they have some restrictions. In this paper we present a novel way to detect ARP cache poisoning inside a LAN. We propose a middleware and synchronous solution t...
Context in source publication
Similar publications
BitTorrent is the most extensively used protocol in peer-to-peer systems. Its clients are widely spread worldwide and account for a large fraction of today’s Internet traffic. This paper will discuss potential attack that exploits a certain vulnerability of BitTorrent based systems. Code injection refers to force a code – which may be malicious - t...