Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

IP address spoofing

Known as: Source address spoofing, Internet protocol spoofing, IP Spoofing 
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1)conceal flooding sources and dilute… Expand
  • figure 1
  • table I
  • figure 2
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Today's Internet hosts are threatened by large-scale distributed denial-of-service (DDoS) attacks. The path identification (Pi… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Tracing DoS attacks that employ source address spoofing is an important and challenging problem. Traditional traceback schemes… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
IP spoofing has been exploited by Distributed Denial of Service (DDoS) attacks to (1) conceal flooding sources and localities in… Expand
  • figure 1
  • table 1
  • figure 3
  • figure 2
  • figure 6
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper, we ask whether it is possible to build an IP address to geographic location mapping service for Internet hosts… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper, we ask whether it is possible to build an IP address to geographic location mapping service for Internet hosts… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Recent occurrences of various Denial of Service (DoS) attacks which have employed forged source addresses have proven to be a… Expand
Is this relevant?
Highly Cited
1989
Highly Cited
1989
The TCP/IP protocol suite, which is very widely used today, was developed under the sponsorship of the Department of Defense… Expand
Is this relevant?