Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,592 papers from all fields of science
Search
Sign In
Create Free Account
IP address spoofing
Known as:
Source address spoofing
, Internet protocol spoofing
, IP Spoofing
Expand
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
6in4
ARP spoofing
Authentication
Blog
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Look Locally Infer Globally: A Generalizable Face Anti-Spoofing Approach
Debayan Deb
,
Anil K. Jain
IEEE Transactions on Information Forensics and…
2020
Corpus ID: 219304564
State-of-the-art presentation attack detection approaches tend to overfit to the presentation attack instruments seen during…
Expand
2019
2019
NETHCF: Enabling Line-rate and Adaptive Spoofed IP Traffic Filtering
G. Li
,
Menghao Zhang
,
+4 authors
Haixin Duan
IEEE International Conference on Network…
2019
Corpus ID: 204792554
In this paper, we design NETHCF, a line-rate in-network system for filtering spoofed traffic. NETHCF leverages the opportunity…
Expand
Highly Cited
2015
Highly Cited
2015
Open Set Fingerprint Spoof Detection Across Novel Fabrication Materials
A. Rattani
,
W. Scheirer
,
A. Ross
IEEE Transactions on Information Forensics and…
2015
Corpus ID: 11421112
A fingerprint spoof detector is a pattern classifier that is used to distinguish a live finger from a fake (spoof) one in the…
Expand
2012
2012
Off-Path Attacking the Web
Y. Gilad
,
A. Herzberg
Workshop on Offensive Technologies
2012
Corpus ID: 6585284
We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and…
Expand
2011
2011
SECURITY APPREHENSIONS IN DIFFERENT REGIONS OF CLOUD CAPTIOUS GROUNDS
Gurdev Singh
,
A. Sharma
,
M. Lehal
2011
Corpus ID: 62682750
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also…
Expand
2011
2011
Towards Deployable DDoS Defense for Web Applications
Prateek Mittal
,
Dongho Kim
,
Yih-Chun Hu
,
M. Caesar
arXiv.org
2011
Corpus ID: 15596013
Distributed Denial of Service (DDoS) attacks form a serious threat to the security of Internet services. However, despite over a…
Expand
Highly Cited
2011
Highly Cited
2011
Preventing replay attacks on speaker verification systems
J. Villalba
,
EDUARDO LLEIDA SOLANO
Carnahan Conference on Security Technology
2011
Corpus ID: 17048213
In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. We understand as spoofing the…
Expand
2008
2008
Ant-based IP traceback
G. Lai
,
Chia-Mei Chen
,
Bingchiang Jeng
,
Willams Chao
Expert systems with applications
2008
Corpus ID: 39066977
Highly Cited
2007
Highly Cited
2007
A Fair Solution to DNS Amplification Attacks
G. Kambourakis
,
Tassos Moschos
,
Dimitris Geneiatakis
,
S. Gritzalis
International Workshop on Digital Forensics and…
2007
Corpus ID: 799006
Recent serious security incidents reported several attackers employing IP spoofing to massively exploit recursive name servers to…
Expand
Highly Cited
1999
Highly Cited
1999
TCP/IP security threats and attack methods
B. Harris
,
R. Hunt
Computer Communications
1999
Corpus ID: 7850419
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE