2 Lecturer, BTL Institute of Technology & Management, ECE Dept., ... Wireless networks are vulnerable to spoofing at
IJRIT InternationalJournal ofResearchinInformationTechnology,Volume1, Issue5, May 2013, Pg. 202-211
InternationalJournalofResearchinInformationTechnology(IJRIT)
www.ijrit.com
ISSN2001-5569
Detection of Masquerade Attacks in Wireless Network 1
K S Nalini Kumari, 2 Mohammed Fayaz
1
Final Year M.Tech Student, Department of ECE, BTL Institute of Technology & Management, Bangalore, Karnataka, India. 2 Lecturer, BTL Institute of Technology & Management, ECE Dept., Bangalore, Karnataka, India 1
[email protected] ,
[email protected]
Abstract Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. A spoofing attack is the most common online attack in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage, it become more sophisticated defense mechanisms. Spoofing based attacks have severe consequences and are wide-spread, but much of the present day Internet is ill-prepared to defend against them. This paper briefly discussed types of attacks in wireless network and mainly how to mitigate many of the well-known (e.g., IP spoofing and MAC spoofing) types of spoofing. Keywords:Spoofing, MAC spoofing, IP spoofing, Pre-configure file, IDPF.
Full text: https://sites.google.com/a/ijrit.com/papers/home/V1I535.pdf
IJRIT
1