Original Poster Posted May 2, 2014 Share Posted May 2, 2014 hello every one, I am writing a research paper but I am having a little trouble finding a paper to back mine up, its common knowledge that MAC Addressed based access lists are a pile of rubbish but I need a paper to back me up on this when i state it (obviously in slightly different words) in my paper. I have searched google scholar and IEEE but there is so many papers out there I am finding it difficult to find someone just saying about the weakness of mac acls Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/ Share on other sites More sharing options...
sc302 Veteran Posted May 2, 2014 Veteran Share Posted May 2, 2014 You are not going to find one that will state that it is absolutely rubbish as they aren't absolutely rubbish. While it is easy to circumvent it, it isn't absolutely rubbish. Perhaps you should go about how to exploit it that makes it "absolutely rubbish" vs trying to find someone with the same thinking. I would say that using mac acl's isn't the most secure method if that is your only way to make your network secure, but using that as an additional method to secure your network isn't a bad thing. this may require you to learn to circumvent your own network that you have secured with mac addressing, so you can see how secure/unsecure it is for yourself. Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/#findComment-596385395 Share on other sites More sharing options...
Original Poster Posted May 2, 2014 Author Share Posted May 2, 2014 On 02/05/2014 at 17:47, sc302 said: You are not going to find one that will state that it is absolutely rubbish as they aren't absolutely rubbish. While it is easy to circumvent it, it isn't absolutely rubbish. Perhaps you should go about how to exploit it that makes it absolutely rubbish vs trying to find someone with the same thinking. thats the purpose of my paper, I am exploiting it in new ways, I just want a paper to back up the well know ease of by passing it. btw I am also viewing this from a wireless perspective Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/#findComment-596385399 Share on other sites More sharing options...
Original Poster Posted May 2, 2014 Author Share Posted May 2, 2014 I found something: Quote ACL, the second technique of access control consists in using list of access. Indeed each access point has a list where are registered all the MAC address of authorized stations. The access point carries out a filtering on the basis of MAC address. Each list must be continuously updated, manually or by specialized software, in order to add or to remove users. This protection is also weak because only a passive listening of the network is sufficient to recover the MAC address [43]. I need stuff like this, this should allow me to continue for a few more minutes though Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/#findComment-596385409 Share on other sites More sharing options...
sc302 Veteran Posted May 2, 2014 Veteran Share Posted May 2, 2014 wireless well that is a bit easier now isn't it. Look at collecting mac addresses. http://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/#findComment-596385411 Share on other sites More sharing options...
Original Poster Posted May 2, 2014 Author Share Posted May 2, 2014 On 02/05/2014 at 17:54, sc302 said: wireless well that is a bit easier now isn't it. Look at collecting mac addresses. http://cecs.wright.edu/~pmateti/InternetSecurity/Lectures/WirelessHacks/Mateti-WirelessHacks.htm cheers! (I hate referencing in papers -_- just for the sheer point of referencing, but if i want to publish it.....sigh) Link to comment https://www.neowin.net/forum/topic/1211793-recommend-a-journal/#findComment-596385415 Share on other sites More sharing options...
Recommended Posts