Why does a traffic shaper need to ARP spoof? Are you trying to shape traffic intra-segement? You can't, unless you have a managed switch that can do it. The network is build into the walls of this ...
Spoofing is a cyber attack that involves a bad actor disguising their identity as one from a name or address you know and trust online. Spoofing can be done to disguise email addresses, phone numbers, ...