Academic literature on the topic 'MAC address spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'MAC address spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "MAC address spoofing"

1

Nasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.

Full text
Abstract:
The Address Resolution Protocol (ARP) is a protocol that converts Internet Protocol (IP) addresses to Media Access Control (MAC) addresses. Due to a security issue known as "Man in the Middle," identity theft is feasible using the ARP protocol. ARP spoofing is one of the weaknesses in wireless networks when an attacker effectively masquerades as a legitimate one. Spoofing attacks will reduce network performance and break several security measures. In networks that use MAC address-based filtering to verify clients, all a spoofer needs is an actual MAC address from an authorised client to gain an unfair advantage. The research recommends developing a security system recognising and preventing ARP spoofing attacks. This system detects ARP spoofing attempts by comparing the static MAC address of the original router to the router's MAC address in the ARP cache table. After detecting the attack using information collected from the router's MAC address in the ARP cache table, the system will conduct a de-authentication attack against the attacker's MAC address. If the attacker is disconnected from the WLAN, they cannot perform ARP spoofing attacks. This system is operated using a Raspberry Pi Model B. Most ARP spoofing attacks can be detected in 0.93 seconds, and responding takes 3.05 seconds.
APA, Harvard, Vancouver, ISO, and other styles
2

Jain, Lalit. "Computer Network: An Implementation of MAC Spoofing." International Journal of Engineering and Computer Science 12, no. 05 (2023): 25717–21. http://dx.doi.org/10.18535/ijecs/v12i05.4733.

Full text
Abstract:
An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.
APA, Harvard, Vancouver, ISO, and other styles
3

Herman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.

Full text
Abstract:
The rapid development of wireless technology has made network communication more accessible but also increasingly vulnerable to security threats. One of the major threats is the Man-in-the-Middle (MitM) Attack, particularly ARP Spoofing, which manipulates the Address Resolution Protocol (ARP) to intercept or alter network traffic. ARP Spoofing, also known as ARP Poisoning, allows attackers to associate incorrect MAC addresses with IP addresses, enabling unauthorized access and potential data interception. This research focuses on the detection and investigation of ARP Spoofing on MikroTik routers using live forensic methods. The study utilizes Wireshark as a primary tool to monitor ARP-based network activity and identify anomalies indicative of ARP Spoofing attacks. The National Institute of Standards and Technology (NIST) forensic framework, which includes Collection, Examination, Analysis, and Reporting, is employed as a methodology for analyzing forensic evidence. The research also incorporates a virtualized attack simulation environment using VirtualBox, where a PC Client acts as the target, an attacker PC executes an ARP Spoofing attack using Ettercap, and Wireshark captures network traffic for forensic examination. The simulation results reveal that an ARP Spoofing attack can successfully manipulate network traffic by altering ARP table entries. The attacker assumes the identity of IP Address 192.168.0.1 with MAC Address e8-cc-18-41-3f-fb, while the target’s identity is duplicated as 192.168.0.19 with MAC Address 08:00:27:15:4c:3c, as confirmed through Wireshark analysis and ARP table inspection using the command prompt. These findings emphasize the importance of implementing proactive security measures, such as Dynamic ARP Inspection (DAI), encryption protocols, and continuous network monitoring, to mitigate the risks associated with ARP Spoofing attacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Nasser, Hiba, and Mohammed Hussain. "An Effective Approach to Detect and Prevent ARP Spoofing Attacks on WLAN." Iraqi Journal for Electrical and Electronic Engineering 19, no. 2 (2023): 8–17. http://dx.doi.org/10.37917/ijeee.19.2.2.

Full text
Abstract:
Address Resolution Protocol (ARP) is used to resolve a host’s MAC address, given its IP address. ARP is stateless, as there is no authentication when exchanging a MAC address between the hosts. Hacking tactics using ARP spoofing are constantly being abused differently; many previous studies have prevented such attacks. However, prevention requires modification of the underlying network protocol or additional expensive equipment, so applying these methods to the existing network can be challenging. In this paper, we examine the limitations of previous research in preventing ARP spoofing. In addition, we propose a defense mechanism that does not require network protocol changes or expensive equipment. Before sending or receiving a packet to or from any device on the network, our method checks the MAC and IP addresses to ensure they are correct. It protects users from ARP spoofing. The findings demonstrate that the proposed method is secure, efficient, and very efficient against various threat scenarios. It also makes authentication safe and easy and ensures data and users’ privacy, integrity, and anonymity through strong encryption techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Ashok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.

Full text
Abstract:
<em>Due to its stateless nature and absence of authentication mechanisms to verify sender identity, the Address Resolution Protocol (ARP) has long been susceptible to spoofing attacks. ARP spoofing often serves as a gateway to more advanced attacks on local area networks, such as denial of service, man-in-the-middle, and session hijacking. Most existing detection methods adopt a passive approach by monitoring ARP traffic for anomalies in the IP-to-Ethernet address mappings. However, this strategy suffers from a delayed response time, often identifying an attack only after it has already caused harm. In this paper, we introduce an active detection technique for ARP spoofing. By injecting ARP request and TCP SYN packets into the network, we proactively probe for mismatches in address mappings. Compared to passive methods, our approach is faster, more intelligent, scalable, and reliable. Additionally, it enhances accuracy in identifying the true MAC-to-IP address associations during an attack scenario.</em>
APA, Harvard, Vancouver, ISO, and other styles
6

Hammal, Mangal Muhammad Usman. "Detection and Mitigation of MAC Spoofing." LC International Journal of STEM 1, no. 2 (2020): 1–5. https://doi.org/10.5281/zenodo.5010206.

Full text
Abstract:
Wireless Local Area Network (WLAN) are generally utilized and getting more in number step by step because of the simplicity of spread signs, quality, and quality. WLAN is additionally simple to actualize in any association. Without any difficulty of utilization, the remote system is likewise simple to produce or bargain because of some shortcoming. Macintosh satirizing is one of the provoking system to be maintained a strategic distance from Macintosh satirizing because conveyable due to devices used to produce the MAC address of system card on the product level. Approval with MAC address got dubious. To beat this issue, we proposed a structure in which client approval process completed by getting three one of kind boundaries of the machine, get hashed and contrasted and the database.
APA, Harvard, Vancouver, ISO, and other styles
7

Ali, Hamid Mohamed, and Ammna Mohamed Abbas. "New Approach in Detection MAC Spoofing in a WiFi LAN." Journal of Engineering 20, no. 08 (2023): 142–55. http://dx.doi.org/10.31026/j.eng.2014.08.09.

Full text
Abstract:
Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).&#x0D; SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.&#x0D;
APA, Harvard, Vancouver, ISO, and other styles
8

Kurabalakota, Gowthami, Divya Pasham, and Kanishka G. "ARP Spoofing in Action: An Ethical Approach to Network Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 245–49. https://doi.org/10.47001/irjiet/2025.inspire39.

Full text
Abstract:
ARP spoofing is a serious problem for network security. It allows hackers to trick a network by linking their own MAC address to a real device’s IP address. This lets them steal, change, or block network traffic. Hackers can use this to launch attacks like Man in the Middle, session hijacking, and Denial of service. Old methods to detect ARP spoofing, like fixed IP-MAC lists and ICMP checks, do not work well in large or real-time systems. This paper suggests a smart way to find and stop ARP spoofing using Bettercap and Deep Packet Inspection (DPI). Bettercap watches ARP traffic in real time, while DPI carefully checks network packets for unusual activity. Together, these tools quickly and accurately detect ARP spoofing with little impact on network speed. The system keeps an eye on ARP messages, deeply examines packet details, and finds suspicious changes. When it detects an attack, it blocks harmful packets, fixes the ARP table with correct information, and informs network admins.
APA, Harvard, Vancouver, ISO, and other styles
9

Tommi Alfian Armawan Sandi, Firmansyah Firmansyah, Sari Dewi, Eka Kusuma Pratama, and Rachmawati Darma Astuti. "Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky." Inspiration: Jurnal Teknologi Informasi dan Komunikasi 12, no. 2 (2022): 65–75. http://dx.doi.org/10.35585/inspir.v12i2.8.

Full text
Abstract:
Security and stability in a network service is a top priority for a network administrator. The slightest security vulnerability can make a very big threat in the stability of network services. The rise of cybercrime that intercepts access to a network service by performing ARP spoofing to imitate a client who has the right to access the network, with this happening it can be detrimental and disrupt network services. The application of MAC Address filtering to access network services is able to minimize the occurrence of cybercrime in the network. The filtering technique used is by registering the MAC address of each network service user who will connect to the network. This technique is able to recap the MAC Address on each device in the MAC Address table and is able to block access to clients whose MAC addresses are not registered. The test results obtained for the comparison of MAC Address filtering security using Dynamic with sticky MAC addresses are that the implementation of port security static sticky is considered better than the implementation of dynamic port security, where if there is a new client trying to access the network and the client's mac address is not registered then the client absolutely does not get access to network services.
APA, Harvard, Vancouver, ISO, and other styles
10

Stepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.

Full text
Abstract:
The paper analyzes the network protocols of computer networks to identify potential vulnerabilities at the software level. The conditions for carrying out a man-in-the-middle attack in networks using the Address Resolution Protocol (ARP) are investigated. Such attacks are of a rather dangerous type, since they are based on the shortcomings of the ARP protocol. A detailed analysis of the stages of the attack and the sequence of impact on the attacked node is given. The technology of ARP spoofing (poisoning) and methods that allow one to infiltrate an existing connection and communication process are examined in detail. An implementation of an ARP spoofing attack in the Python and C# programming languages using the Soapy and SharpPcap libraries is presented. Examples of implementation of denial-of-service (DoS) attacks in a peer-to-peer network using the ARP protocol in C# are given. The article also describes examples of man-in-the-middle attacks associated with various protocols and infiltration into the address space of routers, such as DHCP (a protocol that dynamically assigns an IP address to a client computer) spoofing and ICMP (Internet Control Message Protocol) redirection. Methods for hacking a router and substituting a MAC address and examples of scripts that implement: sending a fake ARP packet; a function for performing a DoS attack; changing the Linux MAC address; router hacks, are presented in the article.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "MAC address spoofing"

1

Dušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.

Full text
Abstract:
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
APA, Harvard, Vancouver, ISO, and other styles
2

Chang, Ko-Chen, and 張克塵. "Design of an Agent-based Mechanism to Counter MAC Address Spoofing Threats in Wireless Networks." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/53232195868099707295.

Full text
Abstract:
碩士<br>元智大學<br>資訊工程學系<br>95<br>Wireless networks provide convenient Internet services. Unfortunately, malicious users can illegally access the network using MAC address spoofing. They may also initiate othter network attacks to violate the rights of legal users. Although many approaches exist to counter MAC address spoofing threats in current access control protocols, their deployment costs are very high. In this thesis, we propose an agent-based mechanism to counter MAC address spoofing threats. Because malicious users cannot get the agent, the illegal transmitted packets will be treated as invalid packets and filtered out. We have implemented this mechanism on Linux and Windows in JAVA. We also show that the mechanism can counter MAC address spoofing threats.
APA, Harvard, Vancouver, ISO, and other styles
3

Chang, Hsun Che, and 張勛哲. "Design of a Detection and Recovery System for MAC Address Spoofing Attacks in Dual-stack Environment." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/09351567947345952804.

Full text
Abstract:
碩士<br>長庚大學<br>資訊管理學系<br>102<br>As the rapid development of the Internet, network security has become more and more important. A large number of attacks and defenses are spreading in the network every day. How to protect confidentiality, integrity and availability of information has become the most important issue for network managers. The deployment of IPv6 is developed to use dual-stack model. The Neighbor Discovery Protocol (NDP) of IPv6 suffers from many attacks, which is similar to Address Resolution Protocol of IPv4 (ARP). These attacks include Denial of Service (DoS), Man-in-the-Middle (MITM) Attack and Flood Attack, etc. In this study, we collect known MAC address spoofing attacks from literature review, analyze the goals and approaches of these attacks from the attackers’ point of view, and analyze the attack prevention mechanisms discussed in past studies from three dimensions: data collection method, detection method and prevention method. In this study, we also design a detection and recovery system for MAC address spoofing attacks in dual-stack environment from the perspective of network managers. The proposed system collects address configuration data by polling core switches and layer 2 switches, maintains the list of important nodes, detects address spoofing attacks via user configurable normalized rules, and recovers the victim host’s cache after detection. We design the detection rules for IPv4 and IPv6 respectively, and the proposed system can be easily implemented in existing mechanisms by not modifying the MAC address resolution process. Experiments show that MAC address spoofing attacks can be detected more effectively by the proposed mechanism.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "MAC address spoofing"

1

Jung, Sungmo, Jong Hyun Kim, and Seoksoo Kim. "A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment." In Advanced Communication and Networking. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23312-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baral, Prashant, Ning Yang, and Ning Weng. "IoT Device Identification Using Device Fingerprint and Deep Learning." In Deep Learning and Reinforcement Learning [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.111554.

Full text
Abstract:
The foundation of security in IoT devices lies in their identity. However, traditional identification parameters, such as MAC address, IP address, and IMEI, are vulnerable to sniffing and spoofing attacks. To address this issue, this paper proposes a novel approach using device fingerprinting and deep learning for device identification. Device fingerprinting is generated by analyzing inter-arrival time (IAT), round trip time (RTT), or IAT/RTT outliers of packets used for communication in networks. We trained deep learning models, namely convolutional neural network (CNN) and CNN + LSTM (long short-term memory), using device fingerprints generated from TCP, UDP, ICMP packet types, ICMP packet type, and their outliers. Our results show that the CNN model performs better than the CNN + LSTM model. Specifically, the CNN model achieves an accuracy of 0.97 using the IAT device fingerprint of ICMP packet type, and 0.9648 using the IAT outlier device fingerprint of ICMP packet type on a publicly available dataset from the crawdad repository.
APA, Harvard, Vancouver, ISO, and other styles
3

Dudnik, Аndriy, and Olexandr Usachenko. "METHODS OF DETERMINATION OF INTERFERENCES IN WIRELESS COMPUTER NETWORKS." In Science, technology, and innovation: the experience of European countries and prospects for Ukraine. Publishing House “Baltija Publishing”, 2021. http://dx.doi.org/10.30525/978-9934-26-190-9-1.

Full text
Abstract:
The subject of the latest research is wireless security, which remains a major issue in LANs around the world. While wireless networks offer convenience and flexibility, they also increase network vulnerability. Security threats such as unauthorized access, denial of service attacks, IP and MAC address spoofing, session theft, and eavesdropping can be problems for WLANs. To counter these threats, various standard authentication and encryption methods are combined with other access control mechanisms. These protocols, devices and methods combine to provide a WLAN level of security equal to or even greater than that of a wired LAN. The methods and technologies used in WLAN security in relation to this study include: Wired Equivalent Privacy (WEP). An older encryption standard used to eliminate security threats. WEP secures the WLAN by encrypting transmitted information so that only receivers with the correct encryption key can decrypt the information; WPA / WPA2 (Secure WI-FI Access). Improvement of WEP by introducing the Temporal Key Integrity Protocol (TKIP). Even when using RC4 encryption, TKIP uses a temporary encryption key that is regularly updated, making it difficult to steal. In addition, data integrity has been improved by using a more robust hashing mechanism; Wireless Intrusion Prevention Systems / Intrusion Detection Systems. Intrusion Detection and Prevention focuses on the radio frequency layers. This includes radio scanning to detect rogue access points or ad hoc networks for network access control. Advanced implementations are able to visually represent the network area along with potential threats and have automatic classification capabilities so that threats can be easily identified. The purpose of the study is to identify existing wireless sensor networks (WSNs) penetration methods by analyzing their methods of communication with each other, hardware and software for reliability and resistance to possible threats.
APA, Harvard, Vancouver, ISO, and other styles
4

Bhimavarapu, Usharani. "Advanced Deep Learning Frameworks for Cyber Security in IoT-Based Healthcare." In Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global, 2025. https://doi.org/10.4018/979-8-3693-8784-9.ch014.

Full text
Abstract:
The rapid adoption of IoT-based healthcare devices has revolutionized the medical industry by enabling real-time monitoring and data collection, yet it raises significant privacy and security concerns. These devices are vulnerable to various cyber-attacks, including man-in-the-middle attacks, spoofing, and data injection, which can compromise sensitive patient information and disrupt critical healthcare operations. To address these challenges, this study explores the application of deep learning techniques, particularly ResNet-50, to classify unforeseen cyber-attacks in IoT-based healthcare systems. The WUSTL-EHMS-2020 dataset, containing biometric data and network flow metrics, is utilized for experimentation. Preprocessing steps like normalization and feature engineering ensure compatibility with the model. ResNet-50, with its residual learning mechanism, effectively extracts complex patterns and generalizes to previously unseen attacks. The model's performance is evaluated using accuracy, precision, recall, and F1-score, demonstrating its ability to identify cyber-attacks while minimizing false positives and negatives. This research underscores the importance of advanced deep learning frameworks in enhancing the security and reliability of IOT-based healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
5

Makhlouf, Amel Meddeb, and Noureddine Boudriga. "Intrusion and Anomaly Detection in Wireless Networks." In Handbook of Research on Wireless Security. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-899-4.ch006.

Full text
Abstract:
The broadcast nature of wireless networks and the mobility features created new kinds of intrusions and anomalies taking profit of wireless vulnerabilities. Because of the radio links and the mobile equipment features of wireless networks, wireless intrusions are more complex because they add to the intrusions developed for wired networks, a large spectrum of complex attacks targeting wireless environment. These intrusions include rogue or unauthorized access point (AP), AP MAC spoofing, and wireless denial of service and require adding new techniques and mechanisms to those approaches detecting intrusions targeting wired networks. To face this challenge, some researchers focused on extending the deployed approaches for wired networks while others worked to develop techniques suitable for detecting wireless intrusions. The efforts have mainly addressed: (1) the development of theories to allow reasoning about detection, wireless cooperation, and response to incidents; and (2) the development of wireless intrusion and anomaly detection systems that incorporate wireless detection, preventive mechanisms and tolerance functions. This chapter aims at discussing the major theories, models, and mechanisms developed for the protection of wireless networks/systems against threats, intrusions, and anomalous behaviors. The objectives of this chapter are to: (1) discuss security problems in a wireless environment; (2) present the current research activities; (3) study the important results already developed by researchers; and (4) discuss the validation methods proposed for the protection of wireless networks against attacks.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "MAC address spoofing"

1

U, Kumaran, B. Umah, Neeharika Ayalasomayujala, Akshith Kosanam, and G. Vivek. "MAC Address Spoofing and its Impact on Network Security." In 2024 4th International Conference on Sustainable Expert Systems (ICSES). IEEE, 2024. https://doi.org/10.1109/icses63445.2024.10763130.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chumchu, Prawit, Tanatat Saelim, and Chunyamon Sriklauy. "A new MAC address spoofing detection algorithm using PLCP header." In 2011 International Conference on Information Networking (ICOIN). IEEE, 2011. http://dx.doi.org/10.1109/icoin.2011.5723112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"WISE GUARD - MAC Address Spoofing Detection System for Wireless LANs." In International Conference on Security and Cryptography. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0002123601400147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, I.-Hsuan, Ko-Chen Chang, Yu-Chi Lu, and Cheng-Zen Yang. "Countermeasures against MAC address spoofing in public wireless networks using lightweight agents." In 5th International ICST Conference on Wireless Internet. IEEE, 2010. http://dx.doi.org/10.4108/icst.wicon2010.8622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Shaw, Shashi, and Prasenjit Choudhury. "A new local area network attack through IP and MAC address spoofing." In 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA). IEEE, 2015. http://dx.doi.org/10.1109/icacea.2015.7164728.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Vijayakumar, R., K. Selvakumar, K. Kulothungan, and A. Kannan. "Prevention of multiple spoofing attacks with dynamic MAC address allocation for wireless networks." In 2014 International Conference on Communications and Signal Processing (ICCSP). IEEE, 2014. http://dx.doi.org/10.1109/iccsp.2014.6950125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kleptsov, M. Y., and M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.

Full text
Abstract:
The ARP-spoofing (Address Resolution Protocol- spoofing) cyberattack nowadays poses a serious threat to the security of computer networks (CS). It is based on the abuse of the ARP protocol, which is responsible for matching IP addresses and physical MAC addresses in local networks. Using this type of attack, an attacker can intercept, redirect and even modify network traffic between devices, leading to serious negative consequences, such as reducing the confidentiality of transmitted data, introducing malware and spoofing network traffic. In the context of the constant development of information technology, the relevance and importance of this problem is increasing, especially for organizations and users of networks working in the logistics and transport. Transport has become a leader in the growth rate of fishing attacks. In this industry, by the end of 2023, the share of attacks of this type increased 2.4 times. This is the data of the BI.ZONE company. Based on the above, the main purpose of this article is, based on the analysis of methods of substitution and distortion of ARP records of the network infrastructure, to propose ways to protect against ARP spoofing, which are based on monitoring ARP records.
APA, Harvard, Vancouver, ISO, and other styles
8

Puanpronpitag, Somnuk, and Atthapol Suwannasa. "A design of egress NAC using an authentication visa checking mechanism to protect against MAC address spoofing attacks." In 2011 8th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON 2011). IEEE, 2011. http://dx.doi.org/10.1109/ecticon.2011.5947832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

TOMCO, Vilma, and Klorenta PASHAJ. "Enhancing Cybersecurity for UAV Systems: Implementing NIS2 Provisions for Safe Drone Deployment in Albania." In International Conference on Cybersecurity and Cybercrime. Romanian Association for Information Security Assurance, 2024. http://dx.doi.org/10.19107/cybercon.2024.04.

Full text
Abstract:
Unmanned Aerial Vehicles (UAVs) have become essential tools in both military and civilian applications, from surveillance to infrastructure monitoring. However, their increased use has raised significant cybersecurity concerns, particularly regarding vulnerabilities to cyberattacks such as GPS spoofing, signal jamming, and data link interception. This paper reviews the key cybersecurity challenges facing UAVs and explores mitigation strategies to enhance UAV security, with a focus on potential applications in Albania. Drawing on recent studies, we examine common attack vectors, including man-in-the-middle (MITM) attacks, denial-of-service (DoS) attacks, and unauthorized data interception. These vulnerabilities pose risks not only to the safe operation of UAVs but also to the integrity of the critical infrastructure they monitor. To address these issues, the paper proposes robust encryption protocols, real-time monitoring systems, and the integration of machine learning-based intrusion detection techniques to safeguard UAV communications and operations. Furthermore, this research highlights the importance of aligning UAV security measures with the EU’s NIS2 Directive, offering recommendations on regulatory frameworks tailored to the Albanian context. The findings emphasize the need for a comprehensive approach to UAV cybersecurity, combining technological innovation with stringent regulatory oversight to ensure safe and secure UAV deployment in Albania's rapidly evolving digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography