An Integrated Approach to Detect and Limit IP Spoofing?
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)Publication Date: 2013-07-30
Authors : Tanmay A. Abhang Uday V. Kulkarni;
Page : 59-65
Keywords : IP spoofing; AS; BGP;
Abstract
Transmission Control Protocol/Internet Protocol (TCP/IP) is the suite of communication protocols used to connect hosts on the Internet. IP address spoofing or IP spoofing is the creation of IP packets with a forged source IP address, with the purpose of hiding the identity of the sender or impersonating another computing system in order to gain unauthorised access. There are number of types of attacks that successfully employ IP spoofing. So it is mandatory for today’s network scenario that there must be some mechanism present to avoid IP spoofing which ultimately causes different kinds of network and resource attacks. Many attempts are made to prevent from such attacks at router or network level. We employ an approach to control IP spoofing at Autonomous System (AS) level or at interdomain level by making use of implicit information contained in border gateway protocol (BGP) messages transferred between border routers of different ASes.
Other Latest Articles
- ELECTRIC FIELD MEASUREMENT IN ROD-DISCONTINUED PLANE AIR GAPS USING DISTRIBUTED CAPACITY PROBE
- A Survey on Security Issues in Wireless Sensor Network
- A REVIEW ON BRAIN TUMOR DETECTION USING SEGMENTATION?
- ADCA: Advanced Density Based Clustering Algorithm for Spatial Database System
- Resource Allocation Based on Agreement with Data Security in Cloud Computing
Last modified: 2013-07-12 00:14:54