The paper is based on various means of "Detecting Wireless LAN MAC Address Spoofing". MAC address is considered as one of the unique identifier for a computer connected to in the public network. This is a very important topic in today's world of high speed technology, where the identity can be masked to intrude in the system. The number and the nature of computer attacks have increased over a period of time. Spoofing the MAC address is not the only way an intruder can get access to the important information through the wireless network, there are other methods and techniques to get access. There are various threats that come from the trusted users than entrusted entities. Even though the MAC address spoofing comes from the external network, importance has to be given to the internal exploiters, who expose the information and make way to the intruders.
Research Methodology and Methods
Identify the methodology used in the two papers and discuss their potential relevance to your own research.
Paper Topic 1: Detecting Wireless LAN MAC Address Spoofing
Paper Topic 2: WIRELESS LAN SECURITY AND LABORATORY DESIGNS
Methodology & Methods of design:
The topic in the research paper mainly focuses on the Security aspect, when it comes to Wireless communication. WLAN and Wireless are the emerging technology which would spread across the globe and can be the future of Communication.
There are numerous methods and methodologies use to ascertain this fact, that securing the wireless channel will be of at most importance.
In this paper of numerous methodologies have been used
Obfuscating network: A hacker select to change the MAC address in an attempt of NIDS.
Bypassing access control: It is used as a basic form to access the control on WLANs, administrators can have the option to configure the neighbouring routers to allow registered MAC addresses to connect to the network.
Authenticated user: Some hardware WLAN security authentication devices match the user authentication to the source MAC address of the user.
WLAN Sequence Number Analysis -The MAC layer for 802.11 networks is significantly more complex than previous IEEE 802 designations.
Identifying FakeAP - FakeAP is a Perl script that utilizes the Host AP client drivers and a dictionary word list to generate 802.11 beacon frames in an attempt to fool NetStumbler, Kismet and other wireless LAN discovery applications
Identifying AirJack - AirJack is a suite of tools that is designed as a proof-of-concept to establish layer 1 man- in-the middle attacks against 802.11 networks
Through careful analysis of layer 2 WLAN activity with anomaly-based intrusion detection tools that are capable of analyzing data-link layer traffic, an administrator can detect applications that hide their activity (through changing MAC addresses) or attempt to masquerade traffic as coming from a legitimate source MAC.
Comments:
The research towards the security and vulnerabilities and ways and means of Spoofing MAC address provides complete information on the existing threats in and around us. Even though there are various protocol and algorism already in place to stop these, hacker and attacker are still exploiting the technology against itself. Further studies have been conducted in the lab environment to improvise the standards and methodology to stop such attacks and make the channels safe and secure. The motive in choosing these topics as my academic was to gain knowledge on the threats and vulnerabilities, work further towards solution.
Research Strategy: Establish your research methods
Identify the methodology used in the two papers and discuss their potential relevance to your own research.
Paper Topic 1: Detecting Wireless LAN MAC Address Spoofing
Paper Topic 2: WIRELESS LAN SECURITY AND LABORATORY DESIGNS
The first Academic Paper is based on "Detecting Wireless LAN MAC Address Spoofing". The methodology and approach were distinctive and qualitative. The study of detecting the MAC Address spoofing and the methods to block the attacks have been extensively studies. some of the techniques of the attackers used to interrupt the network with the help of MAC address spoofing, which is captured by the traffic created by the Air jack, FakeAP and Wellenreiter tools. By the analysis it may trace, it knows the techniques that can be involved to detect the applications that uses MAC address spoofed. The data and experiments conducted provide statistical data to prove the concept.
The Second Academic Paper is on "Wireless LAN security and Laboratory Design". This result further motivates the need for further study in the area of Wireless communication and technologies. The security provides in 802.11b standard such as Service Set Identifier - SSID acts as a WLAN identifier, Wired Equivalent Privacy - 802.11 standards, WEP provides confidentiality MAC Address Filters - AP have been very intrusting topic to work on. Most of our day to day depends on the connectivity to the world of internet is on wireless network. It is very important to know how secure the channel that we use for all critical transactions.
Both of my research and methodologies have potential relevance with my own research which includes study based on facts and investigations. The research towards the security and vulnerabilities and ways and means of Spoofing MAC address provides complete information on the existing threats in and around us. Even though there are various protocol and algorism already in place to stop these, hacker and attacker are still exploiting the technology against itself. Further studies have been conducted in the lab environment to improvise the standards and methodology to stop such attacks and make the channels safe and secure. The motive in choosing these topics as my academic was to gain knowledge on the threats and vulnerabilities, work further towards solution.
Feasibility and Pilot Studies
Hypothesis: The level of competence and the knowledge in using the Internet related computer technology considerably among M.Sc.
Students portray the self- efficacy the investigate the level of competence and demonstrate a data collected using the effect of a student.
Definition: Feasibility & Pilot Studies.
A Feasibility and Pilot study refers to conducting a small sample study before taking up actual study to identify pros and cons associated with it. By carrying out Feasibility and Pilot test, we could pre-test all the research tools; decide on more accurate methodology, process and other important components/functions that add value to the study. It also throws light to the possible course of the project and warns on the risks associated with the study prior to the actual conduct of the project.
Feasibility Studies Advantages for Master's students:
Feasibility study builts the confidence level of the students to take up the study as he can draw the probability of a specific outcome of the project with the help of pilot study.
The less research experience the student has, the more he or she is likely to profit from a pilot study
Learning curve for a student to improve and develop evaluation and analysis skills.
Leadership skill; helps in setting up their goals and plan to meet the same.
We can adjust in time. It can turn out to be valuable should anything be missing in the pilot, it can be added to the experiment
Internet and related technologies:
In today's Technology Era, Internet and related technologies have become part and soul of the world. It has also added a great value to education sector. With emerging use of internet and other related technologies today teachers and students have access to wide range of information not only limited to their schools and universities but even globally.
Today for better communication, we can avail the facilities of e-mail and chat, the fastest means to answer your queries. It also provides opportunities for virtual class rooms, collaboration and communication, developing various new interactive learning classes, Online/e-learning, training, etc.
Some of the common Internet technologies used by students and teachers globally are:
Instant messaging: (Yahoo , MSN , SKYPE)
Web E-mail
Web Blogs
Social networking (Linkedin, Facebook)
Chat Rooms:
Video Conferencing and Video Broadcasting
Pilot Study - Design
The approach was to carry out a pilot study on a group of students and derive at a conclusion. A group of 10 Students were part of the pilot and a small training program was carried out on the students. The students from the department of Information technology,
A List of Questionnaires was put forth to the group of students to analyze the competency level in terms of
Level of Competency
Awareness of Latest Technology
Level of Competency
The Study showed the level of competency among the student. The results were classified at different levels of competencies and are as follows
Level of Knowledge
Competency Level
No of Students
5
Expert
None
4
Strong
3
3
Intermediate
4
2
Active User
3
1
Passive User
None
Awareness of Latest Technology
The Graph represents the study results on the overall competency of the students and the individual ranking based on the following questionnaires
Questionnaires
Student Response
S1
S2
S3
S4
S5
S6
S7
S8
S9
S10
1
Search Engines - Sites Awareness
3
2
3
2
4
2
4
4
2
2
2.8
2
How much information gained from Chat Rooms and Voice chat?
2
3
1
3
2
3
2
2
3
3
2.4
3
Information from social networking websites ?
2
2
3
1
2
4
2
3
1
2
2.2
4
Use of Emails & Blogs?
3
2
2
4
2
3
2
3
2
2
2.5
5
Use of research books?
3
3
3
3
2
2
2
3
2
2
2.5
6
Using video broadcasting?
4
3
1
1
3
2
3
3
2
2
2.4
7
Content Handling
3
2
5
3
2
3
4
2
3
4
3.1
Total Score / Number of Ques
2.8
2.5
2.5
2.4
2.5
2.7
2.7
2.9
2.2
2.5
Overall Knowledge level of Students:
Overall Competence of each element
Competency of Individual Student:
Conclusion: The pilot study is the knowledge that we put our inputs and outputs above the project, much knowledge can be gained through Internet related technologies to focus on improvements and significations in the academics.