Corpus ID: 60744277

Various Anti IP Spoofing Techniques

@article{Patel2015VariousAI,
  title={Various Anti IP Spoofing Techniques},
  author={Sonal Patel and Vikas Jha},
  journal={Journal of Engineering Computers & Applied Sciences},
  year={2015},
  volume={4},
  pages={27-31}
}
  • Sonal Patel, Vikas Jha
  • Published 2015
  • Computer Science
  • Journal of Engineering Computers & Applied Sciences
  • Anti IP Spoofing techniques prevent your system or your Network from the IP Spoofing. IP Spoofing is attack that takes place in Network. It is used to gain unauthorized access to computer by spoofing the IP Address from the IP (Internet Protocol) Packet Header. The main Purpose of IP Spoofing attack is to hide the true identity of the attacker. IP Spoofing is used by the popular attacks like Dos (Denial o Service), DDos (Distributed Denial of Service), and Man in Middle. This Paper Describe… CONTINUE READING
    4 Citations

    Figures, Tables, and Topics from this paper

    A survey of modern IP traceback methodologies
    • 7
    A Survey of Man In The Middle Attacks
    • 217
    • PDF

    References

    SHOWING 1-10 OF 12 REFERENCES
    On the state of IP spoofing defense
    • 71
    • Highly Influential
    • PDF
    Defense Against Spoofed IP Traffic Using Hop-Count Filtering
    • 281
    • PDF
    Hop-count filtering: an effective defense against spoofed DDoS traffic
    • 514
    • PDF
    Pi: a path identification mechanism to defend against DDoS attacks
    • 465
    • PDF
    The spoofer project: inferring the extent of source address filtering on the internet
    • 142
    • PDF
    BASE: an incrementally deployable mechanism for viable IP spoofing prevention
    • 43
    • PDF
    A two-level source address spoofing prevention based on automatic signature and verification mechanism
    • 16
    • PDF
    Efficient and Secure Source Authentication with Packet Passports
    • 68
    • Highly Influential
    • PDF
    Toward Incentivizing Anti-Spoofing Deployment
    • 62
    • Highly Influential
    • PDF
    A Practical IP Spoofing Defense Through Route-Based Fltering
    • 15
    • PDF