Computer Network: An Implementation of MAC Spoofing

An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts suc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of engineering and computer science 2023-05, Vol.12 (5), p.25717-25721
1. Verfasser: Jain, Lalit
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:An exponential growth has observed of network or internet users due to diverse resource and information sharing services. Contrary, network uses also increased in different kinds of attacks. Means network is vulnerable for many types of attacks. Computer network may exploit in different contexts such as denial of service, ping death, malfunction routing, flooding, man in the middle and spoofing attack. Among of these MAC spoofing is kind of attack spoofing attack that target to MAC or physical address of the network host or router. It tampers original address to any other random or user defined address. The aim of the study is to present MAC address and its types. With this, MAC spoofing attack also presented. Implementation environment and method for the MAC spoofing also presented. MAC spoofing is implemented in the KALI Linux operating system with the help of MACCHANGER tool.  
ISSN:2319-7242
2319-7242
DOI:10.18535/ijecs/v12i05.4733