This document presents a technique to identify the correct IP to MAC address mapping when an attacker is performing ARP spoofing. It discusses limitations of existing probe packet-based detection techniques when facing a strong attacker. The proposed technique generates broadcast ARP requests to identify the correct mapping, even if the attacker can modify the protocol stack. Experimental results show the technique can correctly identify the attacker in both weak and strong attacking environments with only a small increase in network traffic overhead.