• Corpus ID: 212534096

IP Spoofing Attack Detection using Route Based Information

  title={IP Spoofing Attack Detection using Route Based Information},
  author={Sneha S. Rana and Tularam M. Bansod},
IP spoofing is almost always used in one of the most difficult attack to defend against – Denial of Service (DoS) attack. DOS attack is evolving due to proliferation of diverse network application. Researchers have performed studies on online/offline network devices such as routers and IDS/IPS. While, the task of deep packet inspection is powerfully handled by IDS/IPS, the real time processing requirement is best suited for routers. The IP packet header information is efficiently handled by… 

Figures from this paper

IP Spoofing Prevention Methods using RPF and SPM

A comparative study of two prevention methods, namely RPF (Reverse Path Forward) and SPM (Spoofing Prevention Method) and its analysis is presented to help researcher to merge the advantages of both methods and propose a new technique so that a secured communication system can be built.

Algorithms for Network Discovery and Detection of MAC and IP Spoofing Security Attacks

An efficient mechanism to detect and block MAC and IP spoofing attacks based on the use of the SNMP protocol, which allows remote access to network devices in order to retrieve their MIB information and is supported by most of the existing network equipment.

A study on the detection of DDoS attack using the IP Spoofing

A method for using TTL (Time To Live) value in IP header to detect DDoS attack with IP spoofing, which occurs when data is transmitted under the agreed regulation between the international and domestic information system.

UHCF: Updated Hop Count Filter Using TTL Probing and Varying Threshold for Spoofed Packet Separation

This paper proposes a novel Updated Hop Count Filtering (UHCF) mechanism using probing and variable threshold for accurately measuring the affected packets from the normal traffic to prove its authenticity and accuracy.

Performance Evaluation of UHCF Using TTLProbing for Packet Spoofing Detection inMANET

This paper presents a complete evaluation of suggested approach, a comparison of the approach with existing mechanisms, and the solution as UHCF (Updated Hop Count Filtering) mechanism suggested in [19].

Analysis of IoT Bots Against DDOS Attack Using Machine Learning Algorithm

  • K. GurulakshmiA. Nesarani
  • Computer Science
    2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI)
  • 2018
The aim of this paper is to classify the traffic against normal and abnormal flow with the help of Support Vector Machine Algorithm (SVM) and predicting earlier abnormal activity.

Novel and secured multi-agent based distributed architecture for e-learning environment

The implementation of Dynamic Hop Count Filtering in the Multiagent based e-learning environment is a system that mitigates the IP spoofing based DOS attacks on the system.

A Proposed Model of IoT Security Management System Based on A study of Internet of Things (IoT) Security

A proposed model of the security management for IoT is presented to enhance the performance of IoT network by selecting the suitable security mechanisms for IoT layers to decrease power and time consumption.



Hop-count filtering: an effective defense against spoofed DDoS traffic

Hop-Count Filtering (HCF) can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage, and is implemented and evaluated in the Linux kernel, demonstrating its benefits using experimental measurements.

DDoS Attack Detection Using IP Address Feature Interaction

The experiment results show that the IAI-based detection scheme can distinguish between normal flows and abnormal flows with DDoS attack flows effectively, and help to identify fast and accurate attack flows when the attacking traffic is hidden among a relatively large volume of normal flows or close to the attacking sources.

A scalable method to protect from IP spoofing

  • H. Farhat
  • Computer Science
    2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT)
  • 2008
It is found that implementing ITS using Bloom filters is simple, saves a substantial amount of router memory, and does not impose large strain on routers.

Network support for IP traceback

A general purpose traceback mechanism based on probabilistic packet marking in the network that allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs).

Spoofing prevention method

  • A. Bremler-BarrH. Levy
  • Computer Science
    Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies.
  • 2005
A new approach for filtering spoofed IP packets, called spoofing prevention method (SPM), is proposed. The method enables routers closer to the destination of a packet to verify the authenticity of

On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets

This paper describes and evaluates route-based distributed packet filtering (DPF), a novel approach to distributed DoS (DDoS) attack prevention, and shows that DPF achieves proactiveness and scalability, and there is an intimate relationship between the effectiveness of DPF at mitigating DDoS attack and power-law network topology.

A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks

Attack diagnosis (AD) is presented, a novel attack mitigation scheme that adopts a divide-and-conquer strategy and is shown to be robust against IP spoofing and to incur low false positive ratios.

D.Song, and A.Yaar, StackPi: A New Defense Mechanism against IP Spoo_ng and DDoS Attacks

  • Technical Report CMU-CS-02-208,
  • 2003

Attack Detection using IP address

  • Feature Interaction,
  • 2009