首页    期刊浏览 2024年09月19日 星期四
登录注册

文章基本信息

  • 标题:A Review on Media Access Control Spoofing
  • 本地全文:下载
  • 作者:Srishti Gupta ; Kirti ; Jaya Chaudhary
  • 期刊名称:International Journal of Engineering and Computer Science
  • 印刷版ISSN:2319-7242
  • 出版年度:2015
  • 卷号:4
  • 期号:4
  • 页码:11301-11305
  • 出版社:IJECS
  • 摘要:This paper cover what is Spoofing, MAC spoofing; why people use it. This paper is a survey onMAC Spoofing. This paper have an overview of spoofing characterized , Vulnerabilities, working andoperation , Detection of MAC Spoofing, Address Resolution Protocol. MAC spoofing. Mac spoofing iscomputer identity theft, for good or for bad reasons, and it is relatively easy. MAC spoofing has anaddress on a NIC (network interface card) ; it is inbuilt on NIC. A MAC Spoofing is to view the nextgenerationtechnology of IT industry. MAC Spoofing is applying to future spoofing servic
  • 关键词:MAC; STA; ARP
国家哲学社会科学文献中心版权所有