1. Held, G.: Ethernet Networks: Design, Implementation, Operation, Management, 1st edn. John Wiley & Sons, Ltd., Chichester (2003)
2. Hubballi, N., Roopa, S., Ratti, R., Barburiya, F., Biswas, S., Nandi, S., Sur, A., Ramachandran, V.: An active intrusion detection system for lan specific attacks. In: The 4th International Conference on Information Security and Assurance (2010) (in press)
3. Kozierok, C.M.: TCP/IP Guide, 1st edn. No Starch Press (October 2005)
4. Tripunitara, M.V., Dutta, P.: A middleware approach to asynchronous and backward compatible detection and prevention of arp cache poisoning. In: Proceedings of the 15th Annual Computer Security Applications Conference, ACSAC 1999, Washington, DC, USA, p. 303. IEEE Computer Society, Los Alamitos (1999)
5. Zhenqi Wang, Y.Z.: Monitoring arp attack using responding time and state arp cache. In: The Sixth International Symposium on Neural Networks (ISNN 2009), pp. 701–709 (2009)