Detection and Mitigation of MAC Spoofing
DOI:
https://doi.org/10.5281/zenodo.5010206Keywords:
Detection and Mitigation, MAC Spoofing, Wireless Local Area Network, Remote SystemAbstract
Wireless Local Area Network (WLAN) are generally utilized and getting more in number step by step because of the simplicity of spread signs, quality, and quality. WLAN is additionally simple to actualize in any association. Without any difficulty of utilization, the remote system is likewise simple to produce or bargain because of some shortcoming. Macintosh satirizing is one of the provoking system to be maintained a strategic distance from Macintosh satirizing because conveyable due to devices used to produce the MAC address of system card on the product level. Approval with MAC address got dubious. To beat this issue, we proposed a structure in which client approval process completed by getting three one of kind boundaries of the machine, get hashed and contrasted and the database.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2020 Hammal Mangal, Muhammad Usman
This work is licensed under a Creative Commons Attribution 4.0 International License.
This work is licensed under a Creative Commons Attribution 4.0 International License (CC BY 4.0).