Design of ARP Intrusion Detection System

Guo Xie-chao
May 2014
Applied Mechanics & Materials;2014, Issue 539, p326
Academic Journal
According to the rapid development of information technology and network flow, ARP intrusion attack from internet is more and more popular, which damages a lot to normal working, especially in some high security demand fields. Therefore, this paper analyzes the principle of ARP intrusion attack, designed the data collect and analyze module of networks, and then developed an ARP intrusion detection system. It shows this system can detect the ARP intrusion correctly and find where the attack occurs.


Related Articles

  • The Real Value Of IP-Based Phone Systems. Passmore, David // Business Communications Review;May2000, Vol. 30 Issue 5, p18 

    Offers a look at the application of the Internet Protocol (IP)-based phone systems. Application of the total cost of ownership model to information technology; Value proposition associated with an IP-based phone system; Efficiency of voice-over IP; Benefits from IP.

  • SCTP: What, Why, and How. Natarajan, Preethi; Baker, Fred; Amer, Paul D.; Leighton, Jonathan T. // IEEE Internet Computing;Sep/Oct2009, Vol. 13 Issue 5, p81 

    The Stream Control Transmission Protocol (SCTP) is a general-purpose IETF transport protocol with kernel implementations on various platforms. Similar to TCP, SCTP provides a connection-oriented, reliable, congestion and flow-controlled layer 4 channel. Unlike both TCP and UDP, however, SCTP...

  • Towards a protocol for the attachment of metadata to grid service descriptions and its use in semantic discovery. Miles, Simon; Papay, Juri; Payne, Terry; Luck, Michael; Moreau, Luc // Scientific Programming;2004, Vol. 12 Issue 4, p201 

    Service discovery in large scale, open distributed systems is difficult because of the need to filter out services suitable to the task at hand from a potentially huge pool of possibilities. Semantic descriptions have been advocated as the key to expressive service discovery, but the most...

  • UK Marine Motorways Study.  // Logistics & Transport Focus;May2001, Vol. 3 Issue 4, p39 

    The use of the Wireless Application Protocol is the main focus of this report. This article argues that people should not call it the mobile Internet. This only raises expectations to a level which cannot be matched. The big mobile commerce success story is the I-Mode, a device that every...

  • Bufferbloat: Dark Buffers in the Internet. Gettys, Jim // IEEE Internet Computing;05/01/2011, Vol. 15 Issue 3, p96 

    Bufferbloat is the existence of excessively large (bloated) buffers into systems, particularly network communication systems. Systems suffering from bufferbloat will have bad latency under load under some or all circumstances, depending on if and where the bottleneck in the communication's path...

  • Research on TCP Congestion Control Mechanisms. Shuguang Zhang; Qiaoyun Sun; Qinghua Gao; Min Wang; Yu Zhang // Advanced Materials Research;7/24/2014, Vol. 989-994, p4427 

    With the rapid development of information society, the number of information data transmitting in the Internet is growing quickly, so congestion control becomes very important and it is a hot research field on the Internet now. In this paper, the sliding window, reasons and TCP algorithms of...

  • The weakest failure detectors to boost obstruction-freedom. Guerraoui, Rachid; Kapalka, Michal; Kouznetsov, Petr // Distributed Computing;Apr2008, Vol. 20 Issue 6, p415 

    It is considered good practice in concurrent computing to devise shared object implementations that ensure a minimal obstruction-free progress property and delegate the task of boosting liveness to independent generic oracles called contention managers. This paper determines necessary and...

  • The great migration. Hill, Leonard // Air Transport World;Sep99, Vol. 36 Issue 9, p85 

    Discusses the migration to the infrastructure of the Internet and Internet Protocol of the airlines in the United States. Three benefits of doing airline business on the Internet; How executives perceived the Internet; Challenges for the information technology departments.

  • NETWORK. Bremze, Paed. Sarmite; Filatovs, Boriss; Kostromins, Andrejs // Proceedings of the Annuals Students International Scientific Con;Apr2009, p4 

    The authors of the report reconsider the significance and complexity of the network systems nowadays in Information Technologies all over the world. Networks help to exchange the information faster, to communicate and develop business through Internet. The network makes it possible to control...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics