Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,400,058 papers from all fields of science
Search
Sign In
Create Free Account
IP address spoofing
Known as:
Source address spoofing
, Internet protocol spoofing
, IP Spoofing
Expand
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
6in4
ARP spoofing
Authentication
Blog
Expand
Broader (1)
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Securing the Private Realm Gateway
Hammad Kabir
,
Jesus Llorente Santos
,
R. Kantola
IFIP Networking Conference (IFIP Networking) and…
2016
Corpus ID: 8965917
The traditional mechanisms to traverse Network Address Translators (NAT) do not scale well to battery powered mobile-hosts: the…
Expand
2013
2013
Writing with Veterans in a Community Writing Group.
Eileen E. Schell
2013
Corpus ID: 73848068
This article provides an analysis of the growing phenomenon of community writing groups for military veterans. Drawing on the…
Expand
2009
2009
Exception Agent Detection System for IP Spoofing Over Online Environments
Al-Samarraie Hosam
,
A. Mustafa
,
Shakeel Ahmad
,
M. Abbas
arXiv.org
2009
Corpus ID: 9726034
Over the recent years, IP and email spoofing gained much importance for security concerns due to the current changes in…
Expand
2009
2009
JUST-Google: A Search Engine-Based Defense Against Botnet-Based DDoS Attacks
Basheer Al-Duwairi
,
G. Manimaran
IEEE International Conference on Communications
2009
Corpus ID: 9846350
Botnet-based distributed denial of service (DDoS) attacks represent an emerging and sophisticated threat for today's Internet…
Expand
2009
2009
Packet Marking with Distance Based Probabilities for IP Traceback
T. Akyuz
,
I. Sogukpinar
First International Conference on Networks…
2009
Corpus ID: 7971646
IP traceback is one of the most important parts of the defense mechanism against DDoS attacks that widely use IP spoofing…
Expand
2009
2009
Detecting Man-in-the-Middle Attacks by Precise Timing
B. Aziz
,
G. Hamilton
Third International Conference on Emerging…
2009
Corpus ID: 18489395
Man-in-the-middle attacks are one of the most popular and fundamental attacks on distributed systems that have evolved with…
Expand
2008
2008
Detection of Spoofing Attacks Using Intrusive Filters For DDoS
V.Shyamaladevi Dr
,
R. Wahidabanu
2008
Corpus ID: 29004088
Internet hosts are threatened by large-scale Distributed Denialof-Service (DDoS) attacks. The Path Identification DDoS defense…
Expand
2008
2008
Analysis of Computer Infection Risk Factors Based on Customer Network Usage
Y. Carlinet
,
L. Mé
,
Hervé Debar
,
Y. Gourhant
Second International Conference on Emerging…
2008
Corpus ID: 14202895
Epidemiology, the science that studies the cause and propagation of diseases, provides us with the concepts and methods to…
Expand
2006
2006
A Coordinated Detection and Response Scheme for Distributed Denial-of-Service Attacks
Ho-Yu Lam
,
Chi-Pan Li
,
S. Chanson
,
D. Yeung
IEEE International Conference on Communications
2006
Corpus ID: 14750455
Distributed denial-of-service (DDoS) attacks present serious threats to servers in the Internet. They can exhaust critical…
Expand
2005
2005
A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment
Mihui Kim
,
K. Chae
International Conference on Information…
2005
Corpus ID: 37858658
The boundary of a distributed denial of service attack, one of the most threatening attacks in a wired network, now extends to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE