Detection and Removal of IP Spoofing Through Extended-Inter Domain Packet Filter Architecture

  title={Detection and Removal of IP Spoofing Through Extended-Inter Domain Packet Filter Architecture},
  author={G. Velmayil and S. Pannirselvam},
  journal={International Journal of Computer Applications},
  • G. Velmayil, S. Pannirselvam
  • Published 2012
  • Computer Science
  • International Journal of Computer Applications
  • IP spoofing makes use of the basic weakness in the Internet Protocol to launch the DDOS attack. The existing methods become ineffective due to a large number of filters required and they lack in information about where to place the filter. The existing system requires the global routing information to defend IP spoofing effectively. We propose Extended Inter Domain Packet Filters (Ex-IDPF) to overcome this problem. The Ex-IDPF comprises of two functional blocks namely, marking and filtering… CONTINUE READING
    4 Citations
    An email application with active spoof monitoring and control
    • T. P. Fowdur, L. Veerasoo
    • Computer Science
    • 2016 International Conference on Computer Communication and Informatics (ICCCI)
    • 2016
    • 6
    Amplification and DRDoS Attack Defense - A Survey and New Perspectives
    • 32
    • Highly Influenced
    • PDF
    Improving the Performance of Multi-Hop Wireless Networks by Selective Transmission Power Control
    • 2
    • PDF


    Controlling IP Spoofing through Interdomain Packet Filters
    • 116
    • PDF
    Spoofing prevention method
    • A. Bremler-Barr, H. Levy
    • Computer Science
    • Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
    • 2005
    • 165
    • PDF
    Defending against spoofed DDoS attacks with path fingerprint
    • 46
    • PDF
    Defense Against Spoofed IP Traffic Using Hop-Count Filtering
    • 281
    • PDF
    Pi: a path identification mechanism to defend against DDoS attacks
    • 465
    • PDF
    A Practical IP Spoofing Defense Through Route-Based Fltering
    • 15
    • PDF
    TTL Based Packet Marking for IP Traceback
    • 41
    • PDF
    Collaborative Detection of DDoS Attacks over Multiple Network Domains
    • 273
    • Highly Influential
    • PDF
    Comparative Evaluation of Spoofing Defenses
    • 31
    • PDF
    SOS: an architecture for mitigating DDoS attacks
    • 211
    • Highly Influential
    • PDF