Recommended Posts

hello every one,

 

I am writing a research paper but I am having a little trouble finding a paper to back mine up, its common knowledge that MAC Addressed based access lists are a pile of rubbish but I need a paper to back me up on this when i state it (obviously in slightly different words) in my paper.

 

I have searched google scholar and IEEE but there is so many papers out there I am finding it difficult to find someone just saying about the weakness of mac acls 

Link to comment
https://www.neowin.net/forum/topic/1211793-recommend-a-journal/
Share on other sites

You are not going to find one that will state that it is absolutely rubbish as they aren't absolutely rubbish.  While it is easy to circumvent it, it isn't absolutely rubbish.  Perhaps you should go about how to exploit it that makes it "absolutely rubbish" vs trying to find someone with the same thinking. 

 

I would say that using mac acl's isn't the most secure method if that is your only way to make your network secure, but using that as an additional method to secure your network isn't a bad thing. this may require you to learn to circumvent your own network that you have secured with mac addressing, so you can see how secure/unsecure it is for yourself.

  On 02/05/2014 at 17:47, sc302 said:

You are not going to find one that will state that it is absolutely rubbish as they aren't absolutely rubbish.  While it is easy to circumvent it, it isn't absolutely rubbish.  Perhaps you should go about how to exploit it that makes it absolutely rubbish vs trying to find someone with the same thinking.

 

thats the purpose of my paper, I am exploiting it in new ways, I just want a paper to back up the well know ease of by passing it. btw I am also viewing this from a wireless perspective

I found something:

 

  Quote

 

ACL, the second technique of access control consists in using list of access. Indeed 

each access point has a list where are registered all the MAC address of authorized 
stations. The access point carries out a filtering on the basis of MAC address. Each list 
must be continuously updated, manually or by specialized software, in order to add or 
to remove users. This protection is also weak because only a passive listening of the 
network is sufficient to recover the MAC address [43]. 
 

I need stuff like this, this should allow me to continue for a few more minutes though

  On 02/05/2014 at 17:54, sc302 said:

wireless well that is a bit easier now isn't it. 

 

Look at collecting mac addresses.

 

http://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm

 

cheers! (I hate referencing in papers -_- just for the sheer point of referencing, but if i want to publish it.....sigh)

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.