Survey on Various IP Spoofing Detection Techniques
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Survey Paper | Computer Science & Engineering | India | Volume 2 Issue 11, November 2013

Survey on Various IP Spoofing Detection Techniques

Ann Mary Jacob, Saritha S

Cyber crimes are becoming increasingly sophisticated and have more severe economic impacts. Each attacker goal can be divided into four main classes: Interruption, interception, modification and fabrication. Based on the attacker goals there are mainly two types of attack, active attack and passive attack. Active attacks are those in which attacker can modify information, interruption services and aim to gain unauthorized access to the network systems. During passive attack, the attacker simply monitors the transmission between the two parties and capture information that is send and receive. For this many traditional network devices such as Intrusion Detection System (IDS), firewalls and security scanners are available. However these techniques will not be able to detect the IP spoofing attacks. And also the spoofing attacks are man-in-the-middle attack. Hence there should be some mechanism by which such attacks can be detected. Through this paper we aim to make a comparative study on various mechanisms by which IP spoofing attack can be detected and specify the different available techniques to prevent the IP spoofing attack. First a penetration test method is presented to detect IP spoofing through the design flaws. Second paper, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, says how IP spoofing can be detected using hop count value. The third paper, A protection Method against Unauthorized Access and Address Spoofing for Open Network Access Systems, which proposed a system for IP spoofing detection has been studied. Finally a comparison of these three methods has been made. The forth paper, Enhanced ARP: Preventing ARP Poisoning-Based Man-in-the-Middle Attacks, defines how to enhance the ARP to detect and prevent man-in-the-middle attack. Through our study we concluded that the system proposed in A protection Method against Unauthorized Access and Address Spoofing for Open Network Access Systems is more efficient and less complex that the other two techniques.

Keywords: Destination IP address, Hop count filtering, IP spoofing, Man-in-the-middle attack, Penetration test, source IP address

Edition: Volume 2 Issue 11, November 2013

Pages: 315 - 318

Share this Article

How to Cite this Article?

Ann Mary Jacob, Saritha S, "Survey on Various IP Spoofing Detection Techniques", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013473, Volume 2 Issue 11, November 2013, 315 - 318

86 PDF Views | 79 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Hop count filtering'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 829 - 832

An Efficient Way to Prevent Dos/DDos Attack in the Cloud Environment

Vaishali Hase, Harish Barapatre

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 315 - 318

Survey on Various IP Spoofing Detection Techniques

Ann Mary Jacob, Saritha S

Share this Article

Similar Articles with Keyword 'IP spoofing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1267 - 1271

An IP Traceback using Packet Logging & Marking Schemes for Path Reconstruction

S. Malathi, B. Naresh Achari, S. Prathyusha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Similar Articles with Keyword 'Man-in-the-middle attack'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1545 - 1550

Ground Rules of Wireless LAN Security

K. Senthamarai

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 315 - 318

Survey on Various IP Spoofing Detection Techniques

Ann Mary Jacob, Saritha S

Share this Article

Similar Articles with Keyword 'Penetration test'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1362 - 1364

Application Research and Penetration Testing on WebSocket Technology

Priyali Mishra, J. Jeysree

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1640 - 1643

A Pioneering of Real Time Penetration Testing With Worm Propagation Model

R.Teja, Dr. V. Cyril Raj

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 325 - 329

Survey on a Novel Approach for Web Service - Security Testing to Improve Web Service Robustness

Vina M. Lomte, Jaydeep Mangle

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 315 - 318

Survey on Various IP Spoofing Detection Techniques

Ann Mary Jacob, Saritha S

Share this Article

Similar Articles with Keyword 'source IP address'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 194 - 197

A Survey on Novel Flow Marking IP Traceback Schemes

S. M. Chaware, Shubhangi R. Sardar

Share this Article

Research Paper, Computer Science & Engineering, Bangladesh, Volume 2 Issue 8, August 2013

Pages: 438 - 444

Proposed Methods of IP Spoofing Detection & Prevention

Sharmin Rashid, Subhra Prosun Paul

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 11, November 2013

Pages: 315 - 318

Survey on Various IP Spoofing Detection Techniques

Ann Mary Jacob, Saritha S

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1776 - 1781

DDoS Attack Defense against Source IP Address Spoofing Attacks

Archana S. Pimpalkar, Prof. A. R. Bhagat Patil

Share this Article
Top