Comparison of Port Security Switch Layer 2 MAC Address Dynamic With MAC Address Static Sticky
Security and stability in a network service is a top priority for a network administrator. The slightest security vulnerability can make a very big threat in the stability of network services. The rise of cybercrime that intercepts access to a network service by performing ARP spoofing to imitate a...
Saved in:
| Main Authors: | Tommi Alfian Armawan Sandi, Firmansyah Firmansyah, Sari Dewi, Eka Kusuma Pratama, Rachmawati Darma Astuti |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Universitas Teknologi Akba Makassar, Lembaga Penelitian dan Pengabdian Masyarakat
2022-12-01
|
| Series: | Inspiration |
| Subjects: | |
| Online Access: | https://ojs.unitama.ac.id/index.php/inspiration/article/view/8 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Mitigating MAC flooding attacks using port security techniques
by: Shehu Ibrahim Gajo
Published: (2025-03-01) -
MacDonald Critchley MacDonald Critchley
by: Alberto M. Martinez, et al.
Published: (2013-01-01) -
MacDonald Critchley
by: Alberto M. Martinez, et al.
Published: (2013-01-01) -
Corrigendum to Fast AES-Based Universal Hash Functions and MACs
by: Augustin Bariant, et al.
Published: (2025-03-01) -
A New Stand-Alone MAC Construct Called SMAC
by: Dachao Wang, et al.
Published: (2025-03-01)