ANALYSIS OF LOCAL NETWORK SECURITY IN MEDIA ACCESS CONTROL ADDRESS SPOOFING WITH ADDRESS RESOLUTION PROTOCOL METHOD

(Case Study: Prisma Depok Vocational School)

Authors

  • jiyan suhada jiyan pribadi

Abstract

The growth and development of the internet is currently advancing and continues to expand its reach, such as in the world of education, which in the current era cannot be separated from internet access to find references for learners or school data management, besides that there are also things that must be known that each device, be it a cellphone, laptop, router, switch, has a different MAC address and will not change, but it can change if there is spoofing activity in a network so that the MAC address will change. The devices or software used include proxy, Windows 10 OS, and also Kali Linux OS. Previously there was research that discussed MAC address spoofing which used wireshark tools to view network traffic, especially in the protocol address resolution protocol which resulted in a simulation of an attack that obtained information in the form of the media access control (MAC) address of the attacker and victim along with the time of the attack. Testing on this MAC address spoofing uses tools in the Linux OS called Macchanger with a note that it is connected to one network first so that the results in the analysis can be detected on the router, 2C: 60: 0C: 79: 4A: 0B The MAC address is the original identity of the device used but changes to A8: 1B:18:BC:4A:03 of the two can still access the internet, therefore by recording the MAC address Address Resolution Protocol on the router server makes the path can be held if spoofing occurs, so the existence of this Address Resolution Protocol successfully entered the spoofing prevention category.

cover

Downloads

Published

2023-09-10

Issue

Section

Articles