摘要 |
A method is described for a NIC to ascertain the presence of spoofing activity and thus detect unauthorized network access. The NIC monitors for packets purporting to be from itself. In one embodiment, a NIC views packets (5000) trafficking on its network and monitors for packets (5000) having its own MAC Address (5001.2), but which it did not send. The falsely purportive packets originate not from the observant NIC, but suspiciously from elsewhere.
|