{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:50:37Z","timestamp":1755838237635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T00:00:00Z","timestamp":1317340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,30]]},"DOI":"10.1145\/2047456.2047468","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"74-83","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Hands-on lab exercises implementation of DoS and MiM attacks using ARP cache poisoning"],"prefix":"10.1145","author":[{"given":"Zouheir","family":"Trabelsi","sequence":"first","affiliation":[{"name":"UAE University, Al-Ain, UAE"}]}],"member":"320","published-online":{"date-parts":[[2011,9,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/948383.948400"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Plummer David C. \"An Ethernet Address Resolution Protocol-Converting Network Protocol to 48 bit Ethernet Address for Transmission on Ethernet Hardware\" RFC-826 November 1982.  Plummer David C. \"An Ethernet Address Resolution Protocol-Converting Network Protocol to 48 bit Ethernet Address for Transmission on Ethernet Hardware\" RFC-826 November 1982.","DOI":"10.17487\/rfc0826"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059534"},{"key":"e_1_3_2_1_4_1","unstructured":"ARP Spoof Tool http:\/\/www.imfirewall.com\/en\/arpspoof.htm.  ARP Spoof Tool http:\/\/www.imfirewall.com\/en\/arpspoof.htm."},{"key":"e_1_3_2_1_5_1","unstructured":"Cain & Abel http:\/\/www.oxid.it\/cain.html.  Cain & Abel http:\/\/www.oxid.it\/cain.html."},{"key":"e_1_3_2_1_6_1","unstructured":"SwitchSniffer http:\/\/www.nextsecurity.net\/software\/SwitchSniffer.html.  SwitchSniffer http:\/\/www.nextsecurity.net\/software\/SwitchSniffer.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Winarp http:\/\/www.arp-sk.org.  Winarp http:\/\/www.arp-sk.org."},{"key":"e_1_3_2_1_8_1","unstructured":"WinArpSpoof http:\/\/www.nextsecurity.net\/software\/Windows_ARP_Spoofer.html.  WinArpSpoof http:\/\/www.nextsecurity.net\/software\/Windows_ARP_Spoofer.html."},{"key":"e_1_3_2_1_9_1","unstructured":"WinArpAttacker URL: http:\/\/www.xfocus.net\/tools\/200606\/WinArpAttacker3.50.Rar  WinArpAttacker URL: http:\/\/www.xfocus.net\/tools\/200606\/WinArpAttacker3.50.Rar"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2010.032618"},{"key":"e_1_3_2_1_11_1","unstructured":"LBNL's Network Research Group \"Arpwatch: Ethernet Monitor Program\" http:\/\/www-nrg.ee.lbl.gov.  LBNL's Network Research Group \"Arpwatch: Ethernet Monitor Program\" http:\/\/www-nrg.ee.lbl.gov."},{"key":"e_1_3_2_1_12_1","unstructured":"Snort: http:\/\/www.snort.org\/  Snort: http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_13_1","first-page":"66","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003","author":"Ornaghi D.","year":"2003","unstructured":"Bruschi, D. Ornaghi , A. Rosti , E., \"S-ARP : a secure address resolution protocol \", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003 ), Page(s): 66 -- 74 , 8--12 December 2003 , Las Vegas, NV, USA. Bruschi, D. Ornaghi, A. Rosti, E., \"S-ARP: a secure address resolution protocol\", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), Page(s): 66--74, 8--12 December 2003, Las Vegas, NV, USA."},{"key":"e_1_3_2_1_14_1","unstructured":"Pandey Omkant \"O-ARP: a secure and fast Address Resolution Protocol\" http:\/\/www.itbhu.ac.in\/departments\/comp\/crypto\/o-arp.pdf.  Pandey Omkant \"O-ARP: a secure and fast Address Resolution Protocol\" http:\/\/www.itbhu.ac.in\/departments\/comp\/crypto\/o-arp.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.55"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11506157_4"},{"volume-title":"2000 Linux Symposium, July 19--22nd","author":"Etienne Jerome","key":"e_1_3_2_1_17_1","unstructured":"Jerome Etienne , \"ARPSec, an ARP security extension \", 2000 Linux Symposium, July 19--22nd , Ottawa, Canada. Jerome Etienne, \"ARPSec, an ARP security extension\", 2000 Linux Symposium, July 19--22nd, Ottawa, Canada."},{"key":"e_1_3_2_1_18_1","unstructured":"Anatomy of an ARP poisoning attack. http:\/\/www.watchguard.com\/infocenter\/editorial\/135324.asp.  Anatomy of an ARP poisoning attack. http:\/\/www.watchguard.com\/infocenter\/editorial\/135324.asp."},{"key":"e_1_3_2_1_19_1","unstructured":"Cisco Systems. Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide http:\/\/www.cisco.com.   Cisco Systems. Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide http:\/\/www.cisco.com."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231056"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.46"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076211.1076246"},{"key":"e_1_3_2_1_24_1","series-title":"IFIP Conference Proceedings","first-page":"3","volume-title":"World Conference on Information Security Education","author":"Vigna G.","year":"2003","unstructured":"G. Vigna . Teaching network security through live exercises . In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education , volume 253 of IFIP Conference Proceedings , pages 3 -- 18 . Kluwer , 2003 . G. Vigna. Teaching network security through live exercises. In C. E. Irvine and H. L. Armstrong, editors, World Conference on Information Security Education, volume 253 of IFIP Conference Proceedings, pages 3--18. Kluwer, 2003."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414558.1414575"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.115"},{"key":"e_1_3_2_1_27_1","first-page":"19","article-title":"The state of infosec education in academia: Present and future directions","year":"1997","unstructured":"\" The state of infosec education in academia: Present and future directions ,\" in National Colloquium on Information System Security Education , 1997 , pp. 19 -- 33 . \"The state of infosec education in academia: Present and future directions,\" in National Colloquium on Information System Security Education, 1997, pp. 19--33.","journal-title":"National Colloquium on Information System Security Education"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1203223"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/364447.364533"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/563517.563480"}],"event":{"name":"InfoSecCD '11: Information Security Curriculum Development Conference","sponsor":["KSU - CISE KSU Center for InfoSec Education","SIGMIS ACM Special Interest Group on Management Information Systems"],"location":"Kennesaw Georgia","acronym":"InfoSecCD '11"},"container-title":["Proceedings of the 2011 Information Security Curriculum Development Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2047456.2047468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:54Z","timestamp":1750240134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2047456.2047468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,30]]},"references-count":29,"alternative-id":["10.1145\/2047456.2047468","10.1145\/2047456"],"URL":"https:\/\/doi.org\/10.1145\/2047456.2047468","relation":{},"subject":[],"published":{"date-parts":[[2011,9,30]]},"assertion":[{"value":"2011-09-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}