Network security management using ARP spoofing

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

IP address which is a limited and important resource is increasingly misused, which results from its inexperienced and malevolent purposes to cause a security problem or damage the entire networks. Because a system that uses an unauthorized IP address may cause some problems to other hosts, the IP address may cause internal security problems in the network, not from externally. This study concerns itself with how a Manager can integrate IP addresses in a distributed network environment to improve survivability of the network. We implement a program that cannot be interfered with by users who are not approved, by using ARP Spoofing, which we then experiment with and analyze.

Original languageEnglish
Pages (from-to)142-149
Number of pages8
JournalLecture Notes in Computer Science
Volume3043
DOIs
StatePublished - 2004

Fingerprint

Dive into the research topics of 'Network security management using ARP spoofing'. Together they form a unique fingerprint.

Cite this