期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2015
卷号:4
期号:4
页码:11301-11305
出版社:IJECS
摘要:This paper cover what is Spoofing, MAC spoofing; why people use it. This paper is a survey onMAC Spoofing. This paper have an overview of spoofing characterized , Vulnerabilities, working andoperation , Detection of MAC Spoofing, Address Resolution Protocol. MAC spoofing. Mac spoofing iscomputer identity theft, for good or for bad reasons, and it is relatively easy. MAC spoofing has anaddress on a NIC (network interface card) ; it is inbuilt on NIC. A MAC Spoofing is to view the nextgenerationtechnology of IT industry. MAC Spoofing is applying to future spoofing servic