International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 141 | Views: 302

Research Paper | Computer Science & Engineering | Bangladesh | Volume 2 Issue 8, August 2013 | Popularity: 6.7 / 10


     

Proposed Methods of IP Spoofing Detection & Prevention

Sharmin Rashid, Subhra Prosun Paul


Abstract: In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ?New form of attack on computers linked to Internet is uncovered, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This paper is on ? ?Proposed methods of IP Spoofing Detection & Prevention?. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.


Keywords: IP address, IP Spoofing, TCP/IP, Compression, Cryptography


Edition: Volume 2 Issue 8, August 2013


Pages: 438 - 444



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sharmin Rashid, Subhra Prosun Paul, "Proposed Methods of IP Spoofing Detection & Prevention ", International Journal of Science and Research (IJSR), Volume 2 Issue 8, August 2013, pp. 438-444, https://www.ijsr.net/getabstract.php?paperid=12013130



Similar Articles

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021

Pages: 368 - 371

A Survey on Different IP Address Lookup Approaches

Manohar Nelli V

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022

Pages: 132 - 137

Deep Learning Model for Image Classification Using Convolutional Neural Network

Shaik Parvez

Share this Article

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1809 - 1812

Efficient Flow Marking IP Traceback System

Sonali H. Mane, S. Pratap Singh

Share this Article

Downloads: 104

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2982 - 2984

Protection of Server from Proxy Based HTTP Attacks

Poonam Uttam Patil, Y. V. Chavan

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1373 - 1376

Filtering of Malicious Traffic Based on Optimal Source

Pikkili Mahendra, K. Raghavendra Rao

Share this Article



Top