[1] C.L. Abad &; R.I. Bonilla, “An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks,” International Conference on Distributed Computing Systems, pp. 60-67, 2007.
[2] F.A. Barbhuiya, S. Biswas &; S. Nandi, “Detection of Neighbor Solicitation and Advertisement Spoofing in IPv6 Neighbor Discovery Protocol,” Proceedings of the 4th International Conference on Security of Information and Networks, pp. 111-118, 2011.
[3] F.A. Barbhuiya, S. Roopa, R. Ratti, N. Hubballi, S. Biswas, A. Sur, S. Nandi &; V. Ramachandran, “An Active Host-Based Detection Mechanism for ARP-Related Attacks, ” Communications in Computer and Information Science, Volume 132, Issue 2, pp. 432-443, 2011.
[4] D. Bruschi, A. Ornaghi, &; E. Rosti, “S-ARP: A Secure Address Resolution Protocol,” Proceedings of the 19th Annual Computer Security Applications Conference, pp. 66-74, 2003.
[5] M. Carnut &; J. Gondim, “ARP Spoofing Detection on Switched Ethernet Networks: A Feasibility Study,” Proceedings of the 5th Symposium on Security in Informatics. pp. 1-10, 2003.
[6] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013-2018,”
http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html , 2014.
[7] J. Davies, “Understanding IPv6,” 3rd Edition, Microsoft Press, 2012.
[8] V. Goyal &; A. Abraham, “An Efficient Solution to the ARP Cache Poisoning Problem,” Proceedings of the 10th Australasian Conference on Information Security and Privacy (ACISP ’05), pp. 40-51, 2005.
[9] S. Kumar &; S. Tapaswi, “A Centralized Detection and Prevention Technique Against ARP Poisoning,” International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec2012), pp. 259-264, 2012.
[10] V. Ramachandran &; S. Nandi, “Detecting ARP Spoofing: an Active Technique,” Proceedings of the First International Conference on Information Systems Security, pp. 239-250, 2005.
[11] Z. Trabelsi &; W. El-Hajj, “On Investigating ARP Spoofing Security Solutions,” International Journal of Internet Protocol Technology, Volume 5, Issue 1-2, pp. 92-100, 2010.
[12] S. Whalen, “An Introduction to ARP Spoofing,” http://www.rootsecure.net/content/downloads/pdf/arp_spoofing_intro.pdf , 2001.
[13] 中華電信,「芳鄰找尋與配發機制介紹」,http://www.tcrc.edu.tw/data2/seminar99/ipv612.pdf,2010。
[14] 王建盛,「ARP Spoofing 防護機制研究」,大同大學資訊工程研究所碩士論文,2010。[15] 吳紹威,「IPv6 安全性研究與實現:利用鄰居發現協議進行攻擊的偵測方法」,澳門科技大學理學碩士論文,2009。
[16] 林光興,「以SNMP與資料探勘技術建構入侵偵測系統」,世新大學資訊管理學系研究所碩士論文,2005。[17] 刘扬,「ARP欺骗攻击的检测及防御技术研究」,东北农业大学学报,第43卷,第8期,第74-77頁,2012。
[18] 李仲正,「以SNMP為基礎之區域網路ARP攻擊偵測與隔離系統」,長庚大學管理學院碩士學位學程在職專班資訊管理組碩士論文,2012。[19] 陈来传,「细数局域网中的ARP攻击类型」,赤峰学院学报(自然科学版),第27卷,第3期,第33-34頁,2011。
[20] 陳向明,「全球IPv6網路佈署發展現況」,http://www.myhome.net.tw/2013_07/p02.htm,2013。
[21] 陳思翰,「IPv6來了」,http://www.ithome.com.tw/node/66363,2011。
[22] 張思揚,「以網路流量偵測ARP欺騙攻擊之研究」,國立高雄大學資訊管理學系碩士論文,2009。[23] 郭蕭禎、謝進利、許忠強,「以SNMP偵測阻斷區域網路ARP欺騙行為」,TANET 2008 台灣網際網路研討會論文集(一),第272-277頁, 2008。
[24] 楊文龍,「基於SNMP之ARP攻擊偵測研究」,國立暨南國際大學資訊管理學系碩士論文,2008。