From: Antoine EMERIT on
This is old but may help :

http://www.securityfriday.com/promiscuous_detection_01.pdf