<s>
An	O
ARP	B-Protocol
cache	I-Protocol
is	O
a	O
collection	O
of	O
Address	O
Resolution	O
Protocol	O
entries	O
(	O
mostly	O
dynamic	O
)	O
that	O
are	O
created	O
when	O
an	O
IP	B-Protocol
address	I-Protocol
is	O
resolved	O
to	O
a	O
MAC	O
address	O
(	O
so	O
the	O
computer	O
can	O
effectively	O
communicate	O
with	O
the	O
IP	B-Protocol
address	I-Protocol
)	O
.	O
</s>
<s>
An	O
ARP	B-Protocol
cache	I-Protocol
has	O
the	O
disadvantage	O
of	O
potentially	O
being	O
used	O
by	O
hackers	O
and	O
cyber	O
attackers	O
(	O
an	O
ARP	B-Protocol
cache	I-Protocol
poisoning	O
attack	O
)	O
.	O
</s>
<s>
An	O
ARP	B-Protocol
cache	I-Protocol
helps	O
the	O
attackers	O
hide	O
behind	O
a	O
fake	O
IP	B-Protocol
address	I-Protocol
.	O
</s>
<s>
Beyond	O
the	O
fact	O
that	O
ARP	B-Protocol
caches	I-Protocol
may	O
help	O
attackers	O
,	O
it	O
may	O
also	O
prevent	O
the	O
attacks	O
by	O
"distinguish[ing]	O
between	O
low	O
level	O
IP	O
and	O
IP	O
based	O
vulnerabilities	O
"	O
.	O
</s>
