Skip to search formSkip to main contentSkip to account menu

IP address spoofing

Known as: Source address spoofing, Internet protocol spoofing, IP Spoofing 
In computer networking, IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a false source IP address, for the… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
State-of-the-art presentation attack detection approaches tend to overfit to the presentation attack instruments seen during… 
2019
2019
In this paper, we design NETHCF, a line-rate in-network system for filtering spoofed traffic. NETHCF leverages the opportunity… 
Highly Cited
2015
Highly Cited
2015
A fingerprint spoof detector is a pattern classifier that is used to distinguish a live finger from a fake (spoof) one in the… 
2012
2012
We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and… 
2011
2011
Cloud computing is a new innovative model for enterprise in which information is permanently stored on the servers and also… 
2011
2011
Distributed Denial of Service (DDoS) attacks form a serious threat to the security of Internet services. However, despite over a… 
Highly Cited
2011
Highly Cited
2011
In this paper, we describe a system for detecting spoofing attacks on speaker verification systems. We understand as spoofing the… 
Highly Cited
2007
Highly Cited
2007
Recent serious security incidents reported several attackers employing IP spoofing to massively exploit recursive name servers to… 
Highly Cited
1999