By Topic

Proving the efficiency of DTF method in a local area network

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Sasu, E.C. ; Politeh. Univ., Timisoara, Romania ; Prostean, O. ; Groza, V.

This paper demonstrates the effectiveness of the method for determining spoofed MAC Addresses by extracting a fingerprint of constant traffic to specific IP destinations. This method, called DTF (Destination Traffic Fingerprint), was described in detail by the authors [8]. This paper presents results of the DTF method in a software tool called NetDTF, which is able to capture traffic in real time and analyze the MAC addresses of network stations based on fingerprints taken for each one of them.

Published in:

Computational Cybernetics and Technical Informatics (ICCC-CONTI), 2010 International Joint Conference on

Date of Conference:

27-29 May 2010