A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm

@article{Arumugam2012ADM,
  title={A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm},
  author={N. Arumugam},
  journal={IOSR Journal of Engineering},
  year={2012},
  volume={02},
  pages={09-16}
}
  • N. Arumugam
  • Published 1 October 2012
  • Computer Science
  • IOSR Journal of Engineering
–A data packet is typically forwarded from one router to another through networks that constitute the internetwork until it gets to its destination node. At the same time routers in the Internet do not perform any security verification of the source IP address contained in the packets. The lack of such verification opens the door for a variety of network security vulnerabilities like denial-of-service (DoS) attacks, man-in-the-middle attacks etc. One of the major threats to the Internet is… 

Figures from this paper

A Review on Detection of Session Hijacking and Ip Spoofing

This paper serves some of the detection algorithm for detecting the Session Hijacking and IP spoofing along with the current proposed solutions.

Detecting IP spoofing in blacklist based packet filter in NIDS using Ant algorithm

The Ant algorithm is proposed to detect the IP s poofed packet in network intrusion detection system if the IP address is spoofed, then it cannot be detected and leads to the denial of service attack.

Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography

A new mechanism to detect the fake access point with the use of sensor nodes in the network and give the protection against IP Spoofing by the Use of public private key cryptography key exchange algorithm is given.

Efficient Mitigation Of IP Spoofing Using BGP-IDPF-CMS Architecture

This paper proposes an architecture which consists of both Border Gateway Protocol (BGP) and Inter Domain Packet Filtering (IDPF) with Customized Message Services (CMS) which limit the spoofing capability of attacks.

Prevention of Session Hijacking and IP Spoofing With Sensor Nodes and Cryptographic Approach

A new mechanism to detect the fake access point with the use of sensor nodes in the network and give the protection against IP Spoofing by the Use of public private key cryptography key exchange algorithm is given.

Prevention of Session Hijacking and Ipspoofing with Sensor Nodes and Cryptographic Approach

A new mechanism to detect the fake access point with the use of sensor nodes in the network and give the protection against IP Spoofing by the Use of public private key cryptography key exchange algorithm is given.

Prevention of Session Hijacking and IP Spoofing with Sensor Nodes and Cryptographic Approach

A new mechanism to detect the fake access point with the use of sensor nodes in the network is given to stop session hijacking.

Secure verification technique for defending IP spoofing attacks

SVT for defending IP spoofing attacks authenticates IP address of each Autonomous System (AS) using Neighbour Authentication (NA) algorithm, which incurs low overhead and significantly improves the performance of network.

Amplification and DRDoS Attack Defense - A Survey and New Perspectives

This work acts as an introduction into amplification attacks and source IP address spoofing and a survey on the state of the art in spoofing defenses is presented.

References

SHOWING 1-10 OF 17 REFERENCES

Defense Against Spoofed IP Traffic Using Hop-Count Filtering

A novel filtering technique, called Hop-Count Filtering (HCF), is presented-which builds an accurate IP-to-hop-count (IP2HC) mapping table-to detect and discard spoofed IP packets.

Ant-based IP traceback

The spoofer project: inferring the extent of source address filtering on the internet

The results are the first to quantify the extent and nature of filtering and the ability to spoof on the Internet and suggest that a large portion of the Internet is vulnerable to spoofing and concerted attacks employing spoofing remain a serious concern.

Practical network support for IP traceback

A general purpose traceback mechanism based on probabilistic packet marking in the network that allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs).

Large-scale IP traceback in high-speed Internet: practical techniques and theoretical foundation

A novel packet logging based traceback scheme that requires an order of magnitude smaller processing and storage cost than the hash-based scheme proposed by Snoeren, et al. (2001), thereby being able to scalable to much higher link speed (e.g., OC-768).

Hash-based IP traceback

This work presents a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past and is implementable in current or next-generation routing hardware.

Efficient packet marking for large-scale IP traceback

A new approach to IP traceback based on the probabilistic packet marking paradigm, which uses large checksum cords to "link" message fragments in a way that is highly scalable, for the checksums serve both as associative addresses and data integrity verifiers.

Inferring Internet denial-of-service activity

This article presents a new technique, called “backscatter analysis,” that provides a conservative estimate of worldwide denial-of-service activity, and believes it is the first to provide quantitative estimates of Internet-wide denial- of- service activity.

Ant system: optimization by a colony of cooperating agents

It is shown how the ant system (AS) can be applied to other optimization problems like the asymmetric traveling salesman, the quadratic assignment and the job-shop scheduling, and the salient characteristics-global data structure revision, distributed communication and probabilistic transitions of the AS.