Toward Automated MAC Spoofer Investigations
Abstract
References
Index Terms
- Toward Automated MAC Spoofer Investigations
Recommendations
Designing a Secure Network Interface By Thwarting Mac Spoofing Attacks
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesIn recent trends, wireless networks have emerged as one of the choicest forms of data communication. Wireless networks provide an array of benefits like, easy installation, flexibility, mobility, scalability and reduced cost of ownership. In spite of ...
Using power hopping to counter MAC spoof attacks in WLAN
CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conferenceIEEE 802.11-based Wireless LANs (WLANs) are deployed in public places, universities, offices and shops. The main reason for the popularity is convenience of internetworking without wires. The increase in WLANs also resulted in increase of security ...
Intelligent detection of MAC spoofing attack in 802.11 network
ICDCN '16: Proceedings of the 17th International Conference on Distributed Computing and NetworkingIn 802.11, all devices are uniquely identified by a Media Access Control (MAC) address. However, legitimate MAC addresses can be easily spoofed to launch various forms of attacks, such as Denial of Service attacks. Impersonating the MAC address of a ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 198Total Downloads
- Downloads (Last 12 months)2
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in