Is there any way to identify the address of a device that performs arp spoofing and dropping traffic for such device with a firewall filter in ROS?
In the absense of this would it be possible to add something such as arpwatch (http://en.wikipedia.org/wiki/Arpwatch) to ROS to enable one to add such addresses to an address list which one can then filter?