ARP spoofing detection method, device and terminal in non-Root environment
A technology of ARP spoofing and detection methods, applied in the field of network security, can solve problems such as ARP spoofing and not providing a better ARP spoofing detection scheme, and achieve the effect of maintaining balance
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0035] Please refer to figure 1 , which shows a schematic diagram of the implementation environment involved in the ARP spoofing detection method in a non-Root environment provided by various embodiments of the present invention, as figure 1 As shown, the implementation environment includes n terminals 110 and target gateways 120, where n is an integer greater than or equal to 2.
[0036] Wherein, the terminal 110 refers to a terminal such as a desktop computer, a tablet computer, a mobile phone, a palmtop computer or an e-reader, which may be connected to the target gateway 120 through a wired or wireless network. figure 1 In the example, the terminal 110 includes four terminals for illustration.
[0037] The target gateway 120 refe...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com