Proposed Methods of IP Spoofing Detection & Prevention
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | Bangladesh | Volume 2 Issue 8, August 2013

Proposed Methods of IP Spoofing Detection & Prevention

Sharmin Rashid, Subhra Prosun Paul

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ?New form of attack on computers linked to Internet is uncovered, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This paper is on ? ?Proposed methods of IP Spoofing Detection & Prevention?. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.

Keywords: IP address, IP Spoofing, TCP/IP, Compression, Cryptography

Edition: Volume 2 Issue 8, August 2013

Pages: 438 - 444

Share this Article

How to Cite this Article?

Sharmin Rashid, Subhra Prosun Paul, "Proposed Methods of IP Spoofing Detection & Prevention ", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=12013130, Volume 2 Issue 8, August 2013, 438 - 444

98 PDF Views | 84 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'IP address'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Research Paper, Computer Science & Engineering, Bahrain, Volume 5 Issue 10, October 2016

Pages: 1112 - 1116

Network Security Mechanism Based On Static Internet Protocol Addressing

Ahmed D. Asad

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 1999 - 2003

A Framework for Secure Cloud Computing Based on Homomorphic Encryption

Ravneet Kaur, Harmandeep Singh

Share this Article

Similar Articles with Keyword 'IP Spoofing'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1267 - 1271

An IP Traceback using Packet Logging & Marking Schemes for Path Reconstruction

S. Malathi, B. Naresh Achari, S. Prathyusha

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Similar Articles with Keyword 'TCP/IP'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2646 - 2649

Improving the Security of SMPP Protocol using TLS

Akash R. Kotecha, H. P. Channe

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1356 - 1359

A Survey of Optimizing the Performance of iSCSI

Shruti Kulkarni, Dr. K. N. Narasimha Murthy

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma, Dr. Manoj Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 967 - 971

A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking

K. Durga Priyanka, Dr. N. Chandra Sekhar Reddy, B. Satish Babu

Share this Article

Similar Articles with Keyword 'Compression'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 823 - 826

Survey Paper on User's Location Hiding In Geosocial Recommendation Applications

Mayura Phadnis, Kanchan Varpe

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 9, September 2020

Pages: 1330 - 1335

Efficient Image Encryption EIE - Compression System Using Haar Wavelets Using Matlab

Kavita, Anil Vadhwa

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3075 - 3078

Secret Data Hiding in Compressed Video Bit Streams for Privacy Information Protection

B. Vengadalakshmi, S. Abiramasundari

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1939 - 1946

An Approach for Video Compression Technique for Efficient Data Backup and Recovery in Public Cloud

Nagaraj S Kolhar, Dr. Suvarna Nandyal

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 950 - 953

Digital Design Dispensation for Digital Radiography System

H. Gomathi, M. Narayanan

Share this Article

Similar Articles with Keyword 'Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article
Top