| The rapid increase on the network scale and the network-based applications has contributed to the growth of information sharing and communicating, and the enhancement of network activities. In the meantime, the network security also becomes the essential problem which effects network capability day by day. While enjoying the convenience brought by the cyberworld, people are disturbed by the security problem caused by it, then the technologies and related products in information security such as authorization and access control, intrusion detection and analysis of security, computer simulation are studying and developing immediately.ARP spoofing, as a typical deception form, had been seriously effected people to get to the Internet normally and information safety in the correspondence. Update day by day along with the network technical, the means of the ARP attackstone upgrades continuously, the form of the attack changes more complicated and diversely, and the influence also immediately strengthened. To solve the problem of security vulnerability of ARP spoofing attack, elder generation have already made many meaningful quest and fulfillments, some prevention schemes for ARP attack has applied in the actual project and relatively mature, of course, inevitably, some limitation exists.Job of this paper devoted to analyzing the ARP spoofing operation mechanism, studying related theory and technique of various ARP attacks, and discussing emphatically the several implements and damages of network attacks that are based upon the security vulnerabilities of ARP. Based on the preceding works, a kind of practical, accurate and safety of defense system pattern is proposed, which is the special emphasis of this paper. The mainly researches and innovation based on the preceding works as follows:(1)The paper analyzes the mechanisms and the forms of ARP spoofing attacks, and studies the existing examination and defense method, then discusses the merit and shortcoming of various defense methods and system patterns against ARP spoofing attacks.(2)In the environment of internal small-scale LAN, we can analyze the attacks mechanisms, summarize the main-feature and the primary effect of this kind of attacks, by programming to carry out an ARP scanning and attacking algorithm, then implementing it simulated.(3)To amend the bug and limitations of the old methods, a kind of practical defense system pattern is proposed, which make use of the WinPcap technique based on server application and client application. The main objective of this system is to defense ARP spoofing attacks of each host in the LAN that connect with low level switch.(4)Programming to achieve the key module of the defending pattern, and then test them, at the same time, checkout them whether achieve the expectant efficacy in the simulated experiment environmentFrom the view of accuracy examination and safely defend, using the experience of means of existing defense, this paper set up a kind of new model of ARP spoofing attacks to eliminate the hidden trouble and guarantee the secure communication which each host in the LAN with the host of dependability. In order to ensure the communication of end to end is securing and credible, this paper will carry out the communication based on data encryption, to guard against ARP attacks accuracy and efficiently. |