[1]Stanger J, Lane P T, Crothers T. CIW Security Professional Study Guide: Exam 1D0470[M]. Hoboken, NJ: John Wiley & Sons, 2006[2]Belenguer J, Calafate C T. A lowcost embedded IDS to monitor and prevent ManintheMiddle attacks on wired LAN environments[C] Proc of IEEE Int Conf on Emerging Security Information, Systems, and Technologies. Piscataway, NJ: IEEE, 2007: 122127[3]郑文兵, 李成忠. ARP欺骗原理及一种防范算法[J]. 江南大学学报, 2003, 2(6): 576578[4]郭浩, 郭涛. 一种基于ARP欺骗的中间人攻击方法及防范[J]. 信息安全与通信保密, 2005 (10): 6668[5]Plummer D C. An Ethernet Address Resolution Protocol[SOL]. IETF RFC 826, 1982 [20141111]. https:tools.ietf.orgrfcrfc826.txt[6]Rescorla E. Http Over TLS[SOL]. IETF RFC 2818, 2000 [20141111]. https:tools.ietf.orgrfcrfc2818.txt[7]Hodges J, Jackson C, Barth A. Http Strict Transport Security (hsts)[SOL]. IETF RFC 6797, 2012 [20150202]. https:tools.ietf.orgrfcrfc6797.txt