1. Cisco Systems
Inc. (2023). Security Configuration Guide
Cisco IOS XE Bengaluru 17.6.x (Catalyst 9300 Switches). "Information About Dynamic ARP Inspection" section. The document states
"Dynamic ARP inspection is a security feature that validates Address Resolution Protocol (ARP) packets in a network. [...] Dynamic ARP inspection prevents malicious users from exploiting the insecure nature of the ARP protocol." It further details how this prevents man-in-the-middle attacks.
2. Odom
W. (2019). CCNA 200-301 Official Cert Guide
Volume 1. Cisco Press. Chapter 13
"Switch Security Configuration
" in the section "Preventing ARP Poisoning with Dynamic ARP Inspection
" it is explained: "The specific attack is called ARP poisoning... The goal of the attack is to create a man-in-the-middle (MITM) attack." (p. 398).
3. Carnegie Mellon University
Software Engineering Institute. (2010). CERT® Oracle® Secure Coding Standard for Java™. Addison-Wesley. In the section "ENV03-J. Do not rely on the default behavior of standard input
output
and error streams
" the text mentions ARP spoofing as a classic example of a man-in-the-middle attack that can be used to intercept network traffic. While not about DAI directly
it authoritatively classifies ARP spoofing as a MITM attack.