(When the computer is connected normally, but the page cannot be opened; perhaps the computer network is frequently disconnected, and the network speed becomes very slow. These may be the network scene shown by the existence of ARP spoofing attacks in the network. ARP spoofing attacks will not only cause instability in the network, causing users to be unable to access the Internet, or may cause serious production accidents due to enterprise network disconnection, and using ARP spoofing attacks can further implement man-in-the-middle attacks, thereby illegally obtaining games, online banking, file services and other systems. The account number and password will cause serious loss of interests to the victim. Therefore, ARP spoofing attack is a very bad network attack behavior. ARP attacks now pose an infinite threat to networks of all walks of life, but they have not been effectively managed. Even the well-known antivirus software and firewalls cannot stop ARP spoofing attacks. Trojans mainly due to ARP spoofing attacks are usually downloaded and activated by disguising as part of common software, or automatically transmitted to the browser's computer as part of the page and activated, or entered through U disk, mobile hard disk, etc. network. Because the shape and characteristics of Trojan programs are constantly changing and upgrading, antivirus software often loses its effectiveness.)