IP address spoofing

Known as: Source address spoofing, Internet protocol spoofing, Ip spoofing 
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1989-2018
010203019892018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Distributed Denial of Service (DDoS) attacks is launched by large number of compromised host to interrupt the services of the… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2015
2015
Distributed Denial of Service (DDoS) attacks is the most challenging problems for network security. The attacker uses large… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
Is this relevant?
2011
2011
IP-spoofing attacks remain one of the most damaging attacks in which an attacker replaces the original source IP address with a… (More)
  • figure 1
  • figure 3
  • table I
  • figure 4
  • figure 2
Is this relevant?
Highly Cited
2008
Highly Cited
2008
The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms… (More)
  • table 1
  • table 2
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1) conceal flooding sources and dilute… (More)
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Today's Internet hosts are threatened by large-scale distributed denial-of-service (DDoS) attacks. The path identification (Pi… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2006
2006
The Distributed Denial of Services (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms… (More)
  • table I
  • figure 2
  • figure 3
  • table II
  • figure 4
Is this relevant?
2006
2006
TCP-based flooding attacks are a common form of Distributed Denial-of-Service (DDoS) attacks which abuse network resources and… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
IP spoofing has been exploited by Distributed Denial of Service (DDoS) attacks to (1) conceal flooding sources and localities in… (More)
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 6
Is this relevant?
2003
2003
Today's Internet hosts are threatened by IP spoofing attacks and large scale Distributed Denial-of-Service (DDoS) attacks. We… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?