Detection and Removal of IP Spoofing Through Extended-Inter Domain Packet Filter Architecture
@article{Velmayil2012DetectionAR, title={Detection and Removal of IP Spoofing Through Extended-Inter Domain Packet Filter Architecture}, author={G. Velmayil and S. Pannirselvam}, journal={International Journal of Computer Applications}, year={2012}, volume={49}, pages={37-43} }
IP spoofing makes use of the basic weakness in the Internet Protocol to launch the DDOS attack. The existing methods become ineffective due to a large number of filters required and they lack in information about where to place the filter. The existing system requires the global routing information to defend IP spoofing effectively. We propose Extended Inter Domain Packet Filters (Ex-IDPF) to overcome this problem. The Ex-IDPF comprises of two functional blocks namely, marking and filtering… CONTINUE READING
4 Citations
Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System
- Computer Science
- 2013
- 3
- PDF
An email application with active spoof monitoring and control
- Computer Science
- 2016 International Conference on Computer Communication and Informatics (ICCCI)
- 2016
- 6
Amplification and DRDoS Attack Defense - A Survey and New Perspectives
- Computer Science
- ArXiv
- 2015
- 32
- Highly Influenced
- PDF
Improving the Performance of Multi-Hop Wireless Networks by Selective Transmission Power Control
- Computer Science
- J. Inform. and Commun. Convergence Engineering
- 2015
- 2
- PDF
References
SHOWING 1-10 OF 30 REFERENCES
Controlling IP Spoofing through Interdomain Packet Filters
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2008
- 116
- PDF
Spoofing prevention method
- Computer Science
- Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
- 2005
- 165
- PDF
Defense Against Spoofed IP Traffic Using Hop-Count Filtering
- Computer Science
- IEEE/ACM Transactions on Networking
- 2007
- 281
- PDF
Pi: a path identification mechanism to defend against DDoS attacks
- Computer Science
- 2003 Symposium on Security and Privacy, 2003.
- 2003
- 465
- PDF
TTL Based Packet Marking for IP Traceback
- Computer Science
- IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference
- 2008
- 41
- PDF
Collaborative Detection of DDoS Attacks over Multiple Network Domains
- Computer Science
- IEEE Transactions on Parallel and Distributed Systems
- 2007
- 273
- Highly Influential
- PDF
Comparative Evaluation of Spoofing Defenses
- Computer Science
- IEEE Transactions on Dependable and Secure Computing
- 2011
- 31
- PDF
SOS: an architecture for mitigating DDoS attacks
- Computer Science
- IEEE Journal on Selected Areas in Communications
- 2004
- 211
- Highly Influential
- PDF