ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

An Integrated Approach to Detect and Limit IP Spoofing?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 7)

Publication Date:

Authors : ;

Page : 59-65

Keywords : IP spoofing; AS; BGP;

Source : Downloadexternal Find it from : Google Scholarexternal


Transmission Control Protocol/Internet Protocol (TCP/IP) is the suite of communication protocols used to connect hosts on the Internet. IP address spoofing or IP spoofing is the creation of IP packets with a forged source IP address, with the purpose of hiding the identity of the sender or impersonating another computing system in order to gain unauthorised access. There are number of types of attacks that successfully employ IP spoofing. So it is mandatory for today’s network scenario that there must be some mechanism present to avoid IP spoofing which ultimately causes different kinds of network and resource attacks. Many attempts are made to prevent from such attacks at router or network level. We employ an approach to control IP spoofing at Autonomous System (AS) level or at interdomain level by making use of implicit information contained in border gateway protocol (BGP) messages transferred between border routers of different ASes.

Last modified: 2013-07-12 00:14:54