ARP spoofing attack detection method and device, computer equipment and storage medium
A technology of ARP spoofing and secondary detection, applied in computer parts, calculation, character and pattern recognition, etc., can solve the problems of lack of benchmark reference, not supporting detection and monitoring of multiple LANs, small traffic analysis, etc., to achieve accurate and comprehensive ARP spoofing detection, expanding the scope of detection, and ensuring the effect of accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0064] The ARP spoofing attack detection method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. Terminal 102 acquires the mirrored traffic of each host computer in the local area network to be analyzed from the server; And extracts the ARP reply message from the mirrored traffic; The mapping table is used to perform preliminary detection on the ARP reply message; when the result of the preliminary detection is abnormal, the terminal 102 ge...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


