Scheduled System Maintenance:
On Monday, April 27th, IEEE Xplore will undergo scheduled maintenance from 1:00 PM - 3:00 PM ET (17:00 - 19:00 UTC). No interruption in service is anticipated.
By Topic

Network simulation for MAC spoofing detection, using DTF method

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Sasu, E.C. ; Politeh. Univ. of Timisoara, Timişoara, Romania ; Prostean, O.

This paper demonstrates the effectiveness of DTF method, by simulating a network and testing how it responds to different situations. All the packets injected into the simulator are collected from real computers. The simulator allow to create a virtual network, with as many network stations as desired. The simulation proves that DTF method can quickly determine if a MAC address is or it is not what it claims to be.

Published in:

Applied Computational Intelligence and Informatics (SACI), 2012 7th IEEE International Symposium on

Date of Conference:

24-26 May 2012