ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration

Journal: GRD Journal for Engineering (Vol.3, No. 3)

Publication Date:

Authors : ; ; ;

Page : 40-43

Keywords : IP spoofing; Man in the Middle Attack (MITM); inbound and outbound rules; call traceback;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In computer networks, it consists of policies and practises adopted to prevent and monitor unauthorised access. Networks can be both public and private where many of the counter attacks were practised. It is long known that IP spoofing or IP address spoofing is one of the major threats in communication protocol. IP spoofing is nothing but IP packets with forged source IP address, with purpose of concealing the identity of sender or impersonating an another computer system by forging the source address of packet header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine .so that the IP spoofing comes into place. In existing, Passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. Though PIT cannot work in all the spoofing attacks and therefore we have proposed a novel idea, to restrict the Man in the Middle Attack (MITM) by providing inbound and outbound rules to avoid the challenges in operation. As long as the real origin of IP spoofing is not disclosed they cannot be deterred from launching further attacks. So the proposed solution ensures that the entity requesting for a service is an actual recipient by trace back the real identification of an attacker. Citation: Bhuvana Natarajan , Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; Nivetha Kuppusamy ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; S. Nalini ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India. "A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration." Global Research and Development Journal For Engineering 33 2018: 40 - 43.

Last modified: 2018-02-25 03:01:38