1. Guo, W., Liu, X.: Monitoring Method of MiM Attack Based on Timeout of ARP Cache. Computer Engineering 23, 566–571 (2002)
2. Ren, X.: The Principle Agreement to Deceive the Analysis and Methods to Resist. Computer Engineer 29, 403–440 (2003)
3. Arpwatch,
ftp://ftp.ee.lbl.gov/arpwatch.tar.gz
4. Demuth, T., Leitner, A.: Arp Spoofing and Poisoning. TrafficTricks Linux Magazine 56, 26–31 (2005)
5. Gouda, M., Huang, C.-T.: A Secure Address Resolution Protocol. Computer Networks 41, 57–71 (2003)