최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Journal of information and communication convergence engineering, v.12 no.3, 2014년, pp.154 - 160
Kang, Jung-Ha (Department of Information and Communication Engineering, Hanbat National University) , Lee, Yang Sun (Division of Computer Engineering, Mokwon University) , Kim, Jae Young (IT Convergence Technology Research Lab., Electronics and Telecommunications Research Institute) , Kim, Eun-Gi (Department of Information and Communication Engineering, Hanbat National University)
The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gate...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
D. C. Plummer, "An Ethernet address resolution protocol," RFC 826, 1982.
W. R. Stevens, TCP/IP Illustrated (Volume 1. The Protocols). Reading, MA: Addison-Wesley, 1994.
R. Braden, "Requirements for Internet hosts: communication layers," RFC 1122, 1989.
W. R. Stevens and G. R. Wright, TCP/IP Illustrated (Volume21. The Implementation). Reading, MA: Addison-Wesley, 1994.
Linux source code [Internet], Available: http://www.kernel.org/pub/linux/kernel/v2.6.
S. G. Bhirud and V. Katkar, "Light weight approach for IP-ARP spoofing detection and prevention," in Proceedings of the 2nd Asian Himalayas International Conference on Internet (AH-ICI), Kathmandu, Nepal, pp. 1-5, 2011.
W. Xing, Y. Zhao, and T. Li, "Research on the defense against ARP spoofing attacks based on WinPcaP," in Proceedings of the 2nd International Workshop on Education Technology and Computer Science (ETCS), Wuhan, China, pp. 762-765, 2010.
K. Wehrle, F. Pahlke, H. Ritter, D. Muller, and M. Bechler, The Linux Networking Architecture: Design and Implementation of Network Protocols in the Linux Kernel. Upper Saddle River, NJ: Pearson Prentice Hall, 2004.
J. Corbet, Linux Device Drivers, 3rd ed. Beijing: O'Reilly, 2005.
A. Bremler-Barr and H. Levy, "Spoofing prevention method," in Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, pp. 536-547, 2005.
K. Yaghmour, Building Embedded Linux Systems, 2nd ed. Sebastopol, CA: O'Reilly, 2008.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.