A network administrator suspects that an attacker is attempting to redirect traffic from a target workstation to the attacker's machine. Which of the following best describes an attack that can achieve this by exploiting the resolution of IP addresses to MAC addresses?
DNS poisoning
ARP poisoning
IV attack
URL redirection