ARP spoofing
flowchart AA["Associated Authors (0)"] C[ARP spoofing] BC["Broader Concepts (2)"] NC["Narrower Concepts (0)"] C== skos:broader ==>BC NC== skos:broader ==>C AA== dcterms:relation ==>C click BC "#broader-concepts" click NC "#narrower-concepts" click AA "#associated-authors" NI["add incoming edge"] NO["add outgoing edge"] NI-- ? -->C C-- ? -->NO click NI "#add-incoming-edge" click NO "#add-outgoing-edge" style NI stroke-width:2px,stroke-dasharray: 5 5 style NO stroke-width:2px,stroke-dasharray: 5 5
- Wikidata
- https://www.wikidata.org/wiki/Q296847
- OpenAlex ID
- https://openalex.org/C86255107 (API record)
- OpenAlex Description
- cyberattack in which an attacker sends spoofed ARP messages onto a LAN to associate the attacker's MAC address with the IP address of another host (e.g. the default gateway), causing any traffic for that IP address to be sent to the attacker instead
- OpenAlex Level [?]
- 5
Broader Concepts
Narrower Concepts
Associated Authors
Add Incoming Edge
Login via ORCiD to contribute.
Add Outgoing Edge
Login via ORCiD to contribute.