[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Malicious JavaScript Insertion through ARP Poisoning Attacks

Published: 01 May 2009 Publication History

Abstract

Details about ARP poisoning attacks as well as countermeasures have been known for years. Yet, most networks are still vulnerable to these attacks because they haven't implemented defenses. This article explains how ARP poisoning attacks work and analyzes how such attacks are exploited in the wild against Web hosting companies, where the ARP poisoning attacks are used for real-time network traffic modification.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Security and Privacy
IEEE Security and Privacy  Volume 7, Issue 3
May 2009
85 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 May 2009

Author Tags

  1. ARP
  2. Address Resolution Protocol
  3. arp poisoning
  4. attack trends
  5. malicious javascript insertion
  6. network
  7. security
  8. security & privacy
  9. security & privacy

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media