• Corpus ID: 60744277

Various Anti IP Spoofing Techniques

@article{Patel2015VariousAI,
  title={Various Anti IP Spoofing Techniques},
  author={Sonal Patel and Vikas Jha},
  journal={Journal of Engineering Computers \& Applied Sciences},
  year={2015},
  volume={4},
  pages={27-31}
}
  • Sonal PatelV. Jha
  • Published 15 January 2015
  • Computer Science
  • Journal of Engineering Computers & Applied Sciences
Anti IP Spoofing techniques prevent your system or your Network from the IP Spoofing. IP Spoofing is attack that takes place in Network. It is used to gain unauthorized access to computer by spoofing the IP Address from the IP (Internet Protocol) Packet Header. The main Purpose of IP Spoofing attack is to hide the true identity of the attacker. IP Spoofing is used by the popular attacks like Dos (Denial o Service), DDos (Distributed Denial of Service), and Man in Middle. This Paper Describe… 

Figures and Tables from this paper

Detection and Prevention of IP Spoofing using BASE Mechanism

The proposed system combines PIT with BASE (BGP based Anti-Spoofing Extension) which is an anti-spoofing protocol intended to achieve the incremental deployment properties which are necessary in today’s Internet environment.

A Hybrid Approach to Address IP Traceback Problem using Nature Inspired Algorithm

The proposed hybrid approach is based on two nature inspired algorithms, Ant Colony Optimization and Particle Swarm Optimization, which most effective approaches in solving combinatorial optimization problems, and can successfully and efficiently detects the DoS attack path with reduced convergence time and computational complexity.

A survey of modern IP traceback methodologies

This paper tends to survey different types of traceback techniques and methodologies for solving the problem of where is the real source of DDoS attack.

A Hybrid Optimization Algorithm Based on Ant Colony and Particle Swarm Algorithm to Address IP Traceback Problem

A hybrid approach by integrating Ant Colony Optimization and Particle Swarm Optimization, to find the efficient solution of IP traceback problem is proposed and results show that the method can successfully and efficiently detect the DoS attack path with reduced convergence time and computational complexity.

A Survey of Man In The Middle Attacks

This paper extensively review the literature on MITM to analyse and categorize the scope of MITM attacks, considering both a reference model, such as the open systems interconnection (OSI) model, as well as two specific widely used network technologies, i.e., GSM and UMTS.

References

SHOWING 1-10 OF 12 REFERENCES

On the state of IP spoofing defense

The current state of IP spoofing is looked into, the various defense mechanisms available today are described, and what obstacles stand in the way of deploying modern solutions and what areas require further research are analyzed.

Defense Against Spoofed IP Traffic Using Hop-Count Filtering

A novel filtering technique, called Hop-Count Filtering (HCF), is presented-which builds an accurate IP-to-hop-count (IP2HC) mapping table-to detect and discard spoofed IP packets.

Hop-count filtering: an effective defense against spoofed DDoS traffic

Hop-Count Filtering (HCF) can identify close to 90% of spoofed IP packets, and then discard them with little collateral damage, and is implemented and evaluated in the Linux kernel, demonstrating its benefits using experimental measurements.

Pi: a path identification mechanism to defend against DDoS attacks

Pi (short for path identifier), a new packet marking approach in which a path fingerprint is embedded in each packet, enabling a victim to identify packets traversing the same paths through the Internet on a per packet basis, regardless of source IP address spoofing.

The spoofer project: inferring the extent of source address filtering on the internet

The results are the first to quantify the extent and nature of filtering and the ability to spoof on the Internet and suggest that a large portion of the Internet is vulnerable to spoofing and concerted attacks employing spoofing remain a serious concern.

BASE: an incrementally deployable mechanism for viable IP spoofing prevention

The proposed BGP Anti-Spoofing Extension mechanism is an anti-spoofing protocol designed to fulfill the incremental deployment properties necessary for adoption in current Internet environments and finds that just 30% deployment can drop about 97% of attack packets.

A two-level source address spoofing prevention based on automatic signature and verification mechanism

A signature-and-verification based IP spoofing prevention method, automatic peer-to-peer based anti-spoofing method (APPA), which is the automatically synchronizing state-machine, which is used to update keys automatically and effectively.

Efficient and Secure Source Authentication with Packet Passports

A packet passport efficiently and securely authenticates the source of a packet and provides incentives for early adoption: a domain that deploys packet passport system can prevent other domains from spoofing its source identifiers.

Toward Incentivizing Anti-Spoofing Deployment

Evaluation results show that MEF is the only method that achieves monotonically increasing deployment incentives for all types of spoofing attacks, and the system design is lightweight and practical.

A Practical IP Spoofing Defense Through Route-Based Fltering

This work presents the design and evaluation of the Clouseau system, which together with route-based filtering (RBF) acts as an effective and practical defense against IP spoofing and shows that RBF brings instant benefit to the deploying network.