Downloads: 141 | Views: 302
Research Paper | Computer Science & Engineering | Bangladesh | Volume 2 Issue 8, August 2013 | Popularity: 6.7 / 10
Proposed Methods of IP Spoofing Detection & Prevention
Sharmin Rashid, Subhra Prosun Paul
Abstract: In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ?New form of attack on computers linked to Internet is uncovered, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This paper is on ? ?Proposed methods of IP Spoofing Detection & Prevention?. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.
Keywords: IP address, IP Spoofing, TCP/IP, Compression, Cryptography
Edition: Volume 2 Issue 8, August 2013
Pages: 438 - 444
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 10 Issue 10, October 2021
Pages: 368 - 371A Survey on Different IP Address Lookup Approaches
Manohar Nelli V
Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 8, August 2022
Pages: 132 - 137Deep Learning Model for Image Classification Using Convolutional Neural Network
Shaik Parvez
Downloads: 102
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1809 - 1812Efficient Flow Marking IP Traceback System
Sonali H. Mane, S. Pratap Singh
Downloads: 104
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2982 - 2984Protection of Server from Proxy Based HTTP Attacks
Poonam Uttam Patil, Y. V. Chavan
Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1373 - 1376Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra, K. Raghavendra Rao