(Nowadays, the LAN technology is more and more prosperous, and network security has become an inevitable topic. Many attackers use arp technology to attack the intended host, which has brought great damage to network security. This article specifically explains the principles and defense methods of arp spoofing.
ARP Spoofing Paper.doc)