Abstract
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
Keywords:
Computer Network, Mac Address, Mac Address Types, Mac Spoofing, Kali Linux, Macchanger Tool.
References
Tanenbaum, “Computer Networks” -PHI Learning
Forouzan, “TCP/IP-Protocol suite”, TMH 3rd edition
David C. Plummer, “An Ethernet Address Reso-lution Protocol”, RFC-826, Network Working Group, November 1982.
Alok Pandey, Dr. Jatinderkumar R. SainiCoun-ter Measures to Combat Misuses of MAC Address Spoofing Techniques, Int. J. Advanced Networking and Applications 1358 Volume: 03, Issue: 05, Pages: 1358-1361 (2012).
Min-kyu Choi, Rosslin John Robles, Chang-hwa Hong, Tai-hoon Kim, “Wireless Network Security: Vulnerabilities, Threats and Countermeasures”, International Journal of Multimedia and Ubiquitous Engineering, 3(3), July 2008, 516-520
Arbaugh, William A., Shankar, Narendar, and Wan, Y.C. Justin, “Your 802.11 Wireless Networks have no clothes”, 2001
Downloads
Download data is not yet available.