| Along with the popularization of computer networks and communication technologies, the rapid development of network information has gradually become an important resource for the development of today's society. Network interconnection generally use the TCP / IP protocol, due to network designers and network protocol designers, beginning in the design of the problem is not only considered the efficiency of network security issues to consider, so almost all the network protocols is flawed, ARP protocols Similarly, there are also security vulnerabilities.This paper analyzes the ARP protocol and protocol vulnerabilities; ARP virus attacks principles and ways and means to compare the existing detection, positioning and prevention methods advantages and disadvantages. A detection, location and specific model to prevent ARP virus is built. Can effectively detect the exchange of ARP cache table, ARP cache mapping by analysis of the information to identify the risk of fraud, or who is the attacker, through the remote setting of the ACL and other operations on the switch to detect the risk of processing, you can effectively to prevent and detect ARP attacks. |