A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 137 | Weekly Hits: ⮙1

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 10, October 2014

A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking

K. Durga Priyanka, Dr. N. Chandra Sekhar Reddy, B. Satish Babu

With wide spread use of internet in various fields, networks are being exposed to many security vulnerabilities such as distributed denial of service (DDoS) attack, worm/virus, and so on. The prevention failure of network security leads to either revealing of sensitive information or interruption of network services, thereby results in the enormous economic loss. The distributed DoS attack will occurs at Network level by obtaining IP addresses. This kind of vulnerability is called as IP Spoofing. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. This paper focus on the defense against IP spoofing attacks using Packet filtering methods and Packet Marking techniques. This scheme is defense against DDoS attacks and IP Spoofing attacks.

Keywords: DDoS, IP Spoofing, TCP/IP, IDS

Edition: Volume 3 Issue 10, October 2014

Pages: 967 - 971

Share this Article

How to Cite this Article?

K. Durga Priyanka, Dr. N. Chandra Sekhar Reddy, B. Satish Babu, "A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=8101403, Volume 3 Issue 10, October 2014, 967 - 971

Enter Your Registered Email Address





Similar Articles with Keyword 'DDoS'

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 100 | Weekly Hits: ⮙2 | Monthly Hits: ⮙11

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2832 - 2836

Minimization of DDoS Attack using Firecol an Intrusion Prevention System

Bhagyashri Kotame, Shrinivas Sonkar

Share this Article

Downloads: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1612 - 1616

Survey Paper on Mitigation Mechanisms for Distributed Denial of Service Attacks

Vishal Mahale, Deepali Gothawal

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Similar Articles with Keyword 'IP Spoofing'

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 108 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1262 - 1265

A Survey on IP Traceback Mechanisms

Aparna C Bhadran, Maria Joy

Share this Article

Downloads: 115 | Monthly Hits: ⮙13

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1595 - 1601

Flexible Deterministic Packet Market: An IP Traceback Scheme

Pooja G. Kukreja, D.N.Rewadkar

Share this Article

Downloads: 127 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1568 - 1571

Design and Implementation of ADFM in Network Processor

Gayatri Ratilal Mali, N. P. Karlekar

Share this Article

Downloads: 129 | Monthly Hits: ⮙7

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015

Pages: 570 - 574

Forensics Tracking for IP Spoofers Using Path Backscatter Messages

Mithun Dev P D, Anju Augustine

Share this Article

Similar Articles with Keyword 'TCP/IP'

Downloads: 106 | Weekly Hits: ⮙3 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2646 - 2649

Improving the Security of SMPP Protocol using TLS

Akash R. Kotecha, H. P. Channe

Share this Article

Downloads: 107 | Weekly Hits: ⮙2 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1253 - 1257

A Trust System for SCADA Network Using Wireless Sensor Based on Node Behaviors

B.Padmini, N. Chandra Shekar Reddy, Ch. Mukunda Reddy

Share this Article

Downloads: 113 | Weekly Hits: ⮙4

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1356 - 1359

A Survey of Optimizing the Performance of iSCSI

Shruti Kulkarni, Dr. K. N. Narasimha Murthy

Share this Article

Downloads: 116 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2508 - 2514

Lock and Forward Hierarchical Routing Algorithm in MANET

Vikrant Verma, Dr. Manoj Kumar

Share this Article

Downloads: 137 | Weekly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 967 - 971

A Novel Method Defense against IP Spoofing Using Packet Filtering and Marking

K. Durga Priyanka, Dr. N. Chandra Sekhar Reddy, B. Satish Babu

Share this Article

Similar Articles with Keyword 'IDS'

Downloads: 70 | Weekly Hits: ⮙2 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020

Pages: 1317 - 1319

A Survey on Usage of Artificial Intelligence Algorithm in Efficiency of WSN

Chaitanya Sharma

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2025 - 2030

Detection And Mitigation of Distributed Denial of Service Attack by Signature based Intrusion Detection System

Hardik M. Shingala, Mukesh Sakle

Share this Article

Downloads: 102 | Weekly Hits: ⮙3 | Monthly Hits: ⮙10

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Downloads: 102 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 7 Issue 5, May 2018

Pages: 1579 - 1580

A Review of Incremental Data Load on Premises to Azure

Tejaswee Poya, Rahul Mishra

Share this Article

Downloads: 103 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2327 - 2330

A Survey Paper on Data Clustering using Incremental Affine Propagation

Pratap Shinde, Madhav Ingle

Share this Article



Top