Counter Measures to Combat Misuses of MAC Address Spoofing Techniques
Journal: International Journal of Advanced Networking and Applications (Vol.3, No. 05)Publication Date: 2012-03-02
Authors : Alok Pandey; Jatinderkumar R. Saini;
Page : 1358-1361
Keywords : ARP; MAC; MAC Spoofing; NIC;
Abstract
In a computer network several communicating devices are connected to a common shared communication medium. A network interfacing card or a wireless network card is typically used to connect computers on a network. This gives rise to the need of unique identification mechanism to be followed for each of the connected devices. Media Access Control (MAC) addressing is used to properly identify communicating devices. The term MAC spoofing refers to a situation when somebody changes the MAC address of his computer or the network communicating device to impersonate someone else based upon this MAC address identification. Although MAC spoofing may be essential in some situations yet it has become potential threat for the network security as it sets ground for formulating and launching different types of Attacks like ARP Spoofing, DNS Poisoning, Denial of Services, Session Hijacking, Man in the Middle Attack etc. on a network. The purpose of this paper is to spread the awareness about MAC addressing, MAC spoofing techniques normally used, different types of attacks that can be based upon MAC spoofing and some of the counter measures that can be adopted by common network users.
Other Latest Articles
- Comparative Analysis of Routing Attacks in Ad Hoc Network
- A Survey on Security Issues in Ad Hoc Routing Protocols and their Mitigation Techniques
- Elliptic Curve Point Multiplication Using MBNR and Point Halving
- Optimal Routing In Ad-Hoc Network Using Genetic Algorithm
- Energy Aware Node Selection for Cluster-based Data Accuracy Estimation in Wireless Sensor Networks
Last modified: 2015-12-03 20:18:26