Imam, Md. Abdullah Yusuf and Biswas, Prodip Kumar (2023) MAC Address Cloning Technique Results. In: Contemporary Perspective on Science, Technology and Research Vol. 2. B P International, pp. 120-129. ISBN 978-81-968656-7-2
Full text not available from this repository.Abstract
MAC address cloning causes the Docker container to use the MAC address of the host, and the host to use the MAC address of either an address you specify or a randomly generated one. MAC filtering is not an effective way in wireless networking as attackers cannot search easily MAC address on wireless transmissions mode. On the other hand, in a wired network, MAC filtering works better since it is simpler for an attacker to determine an approved MAC address. Every LAN card has a unique MAC address allocated to it. In this way, Changing MAC address is necessary in network virtualization. It can also be used in the process of exploiting security of a system. By cloning MAC address makes one device hidden from outsider, in the same way cloning MAC address makes a network vulnerable. It is important to choice who wants to do what. In IP networks, the MAC address of an interface is query given the IP address using the Address Resolution Protocol (ARP) for Internet Protocol Version 4 (IPv4) or the Neighbor Discovery Protocol (NDP) for IPv6. ARP and NDP are used to relate IP addresses (OSI layer 3) to Ethernet MAC addresses (OSI layer 2). Security can be enhanced through MAC address cloning because it enables you to use a dedicated virtual NIC for the Admin Network, Grid Network, and Client Network. Having the Docker container use the MAC address of the dedicated NIC on the host allows you to avoid using promiscuous mode network configurations.
Item Type: | Book Section |
---|---|
Subjects: | Archive Paper Guardians > Multidisciplinary |
Depositing User: | Unnamed user with email support@archive.paperguardians.com |
Date Deposited: | 30 Dec 2023 09:33 |
Last Modified: | 30 Dec 2023 09:33 |
URI: | http://archives.articleproms.com/id/eprint/2565 |