Typical examples for these attacks are ARP scan, ARP spoofing , port stealing, DHCPv4 starvation , and DHCPv4 spoofing.
ARP spoofing is prevented in this context by discarding nonapproved source addresses.
-Dynamic ARP Inspection (DAI) inspects ARP packets, can prevent from ARP spoofing
and ARP cache poisoning attacks, validate ARP packets, and discard invalid IP-to-MAC address bindings according to DHCP snooping or static DHCP binding, keep the MAC table correct.
In , the authors propose a way to detect anomalous events by analyzing the users' operation history of DLNA devices using ARP spoofing. A collaborative content play method is proposed in  that automatically associates the main-content with the sub-content based on attribute information matching in order to enhance user entertainment experience.
ARP spoofing is a technique where fake ("spoofed") ARP messages are sent onto a Local Area Network.
An ARP spoofing attack is an attack in which the media access control (MAC) address of a computer is masqueraded as that of another.
Section 2 discusses related studies including problems in ARP spoofing, security requirements, and existing research.
For advanced device-detection and policy-enforcement capabilities, the appliance protects against ARP spoofing
, and enables session-specific policy creation and enforcement, open-port hardening and network-agnostic blocking.--ForeScout Technologies
He gives a summary of Unix and Windows host security, including basic tools and techniques, then covers privacy and anonymity that will use encryption and other methods to guard against such felonies as phishing, firewalls, including installing and using commercial firewall products, encryption and securing services, network security, including detecting ARP spoofing
and tracking attackers, wireless security, logging, monitoring and trending, secure tunnels, network intrusion protection, recovery and response.
Like many IP devices, VoIP phones are vulnerable to ARP spoofing
, allowing man-in-the-middle attacks and including data interception and packet injection.
With the Layer 2 Firewall, wireless clients are protected from popular security breaches such as ARP spoofing
, password sniffing, DHCP spoofing, and other malicious attacks commonly found in public wireless environments.