A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration
Journal: GRD Journal for Engineering (Vol.3, No. 3)Publication Date: 2018-03-01
Authors : Bhuvana Natarajan; Nivetha Kuppusamy; S. Nalini;
Page : 40-43
Keywords : IP spoofing; Man in the Middle Attack (MITM); inbound and outbound rules; call traceback;
Abstract
In computer networks, it consists of policies and practises adopted to prevent and monitor unauthorised access. Networks can be both public and private where many of the counter attacks were practised. It is long known that IP spoofing or IP address spoofing is one of the major threats in communication protocol. IP spoofing is nothing but IP packets with forged source IP address, with purpose of concealing the identity of sender or impersonating an another computer system by forging the source address of packet header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine .so that the IP spoofing comes into place. In existing, Passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. Though PIT cannot work in all the spoofing attacks and therefore we have proposed a novel idea, to restrict the Man in the Middle Attack (MITM) by providing inbound and outbound rules to avoid the challenges in operation. As long as the real origin of IP spoofing is not disclosed they cannot be deterred from launching further attacks. So the proposed solution ensures that the entity requesting for a service is an actual recipient by trace back the real identification of an attacker.
Citation: Bhuvana Natarajan , Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; Nivetha Kuppusamy ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; S. Nalini ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India. "A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration." Global Research and Development Journal For Engineering 33 2018: 40 - 43.
Other Latest Articles
- A Mathematical Model on Vorinostat (Histone Deacetylase Inhibitor) in Combination with Radiotherapy
- Experimental Investigations of Translucent Concrete using Optical Fibres
- Intelligent Energy Management System using AC Microgrid for Renewable Energy Integration
- Implementation of Swadaya Control and Efforts to Prevent False Honey Circulation for Community Hidden Leadership
- RP-HPLC METHOD DEVELOPMENT AND VALIDATION FOR THE SIMULTANEOUS ESTIMATION OF NIACIN AND SIMVASTATIN IN TABLET DOSAGE FORM
Last modified: 2018-02-25 03:01:38