[1] Microsoft. 集線器、交換器、路由器以及存取點有何不同?. Available: http://windows.microsoft.com/zh-tw/windows/hubs-switches-routers-access-points-differ#1TC=windows-7
[2] A. NetCut. NetCut. Available: http://www.arcai.com/
[3] 王永鐘、王宜秀, "ARP Spoofing 偵測及防護機制-以 Arcai Netcut 軟體為例," 2013.
[4] S.-C. Yang, "利用 ARP 進行封包擷取之技術改進," 2007.
[5] 王建盛, "ARP Spoofing 防護機制研究," 碩士, 資訊工程學系(所), 大同大學, 臺北市, 2011.[6] D. Plummer, "An Ethernet address resolution protocol (RFC 826)," Network Working Group, 1982.
[7] 楊文龍, "基於SNMP之ARP攻擊偵測研究," 碩士, 資訊管理學系, 國立暨南國際大學, 南投縣, 2008.[8] 張思揚, "以網路流量偵測 ARP 欺騙攻擊之研究," 2009.
[9] 陳治榤, "位址解析協定欺騙攻擊防禦系統設計與實作," 碩士, 資訊管理研究所, 國立高雄第一科技大學, 高雄市, 2011.[10] A. Orebaugh, G. Ramirez, and J. Beale, Wireshark &; Ethereal network protocol analyzer toolkit: Syngress, 2006.
[11] N. Briscoe, "Understanding the OSI 7-layer model," PC Network Advisor, vol. 120, 2000.
[12] J. Postel, "DOD standard Internet protocol," 1980.
[13] 施威銘研究室, Internet協定 TCP/IP 觀念與實作, 1991.
[14] D. Plummer, "Ethernet Address Resolution Protocol: Or converting network protocol addresses to 48. bit Ethernet address for transmission on Ethernet hardware," 1982.
[15] S. Whalen, "An introduction to arp spoofing," Node99 [Online Document], April, 2001.
[16] T. Christiansen, A. E. W. Te, L. Wall, K. L. S. X. Sen, J. Orwant, D.-w. Jiang, et al., Perl 程式設計第三版: O'Reilly Taiwan, 2005.