Secure Verification Technique for Defending IP Spoofing Attacks
Journal: The International Arab Journal of Information Technology (Vol.13, No. 2)Publication Date: 2016-03-01
Authors : Alwar Rengarajan; Rajendran Sugumar; Chinnappan Jayakumar;
Page : 302-309
Keywords : IP; IP spoofing; SVT.;
Abstract
The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attacks in the network, a secure authentication technique is required to defend against spoofing attacks. In order to achieve this, in this paper, we p ropose a (SVT) for defending IP spoofing attacks. Our technique authenticates IP address of each Autonomous System (AS) using Neighbour Authentication (NA) algorithm. The algorithm works by validating NA table NA constructed by each node. The NA table is transmitted securely using RC-6 encryption algorithm. In addition to encryption, our technique use arithmetic coding to compress and decompress the NA table. The performance of our technique is proved through simulation results. Our technique incurs low overhead and significantly improves the performance of network
Other Latest Articles
- Dynamic Group Recommendation with Modified Collaborative Filtering and Temporal Factor
- Performance of Random Forest and SVM in Face Recognition
- Analyzing Learning Concepts in Intelligent Tutoring Systems
- A Group based Fault Tolerant Scheduling Mechanism to Improve the Application Turnaround Time on Desktop Grids
- Probabilistic and Fuzzy Logic based Event Processing for Effective Business Intelligence
Last modified: 2019-11-13 20:45:18