期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
印刷版ISSN:2277-6451
电子版ISSN:2277-128X
出版年度:2013
卷号:3
期号:4
出版社:S.S. Mishra
摘要:The Internet protocol suite is commonly known as TCP/IP protocol suite, because of its two important pro-tocols, A) Transmission Control Protocol (TCP) and B) Internet Protocol (IP). IP spoofing, also known as IP address forgery is a technique in which an attacker attacks on a host by masquerading as a trusted host. Attacker does so by modifying the IP packet header with a forged or spoofed source IP address field. Main purpose behind IP spoofing is to conceal true identity of the sender by impersonating another computing system. By employing IP spoofing, attack-ers remain hidden from detection and put a considerable limitation on the destination network or victim for policing attack packets. In response to such attack the victim machine or network is misled to innocent network or host and drops subsequent packets from the same. IP spoofing has become a popular tool in various attacks like Distributed Denial of Service (DDoS) attack, Internet Control Message Protocol Magnification attack (ICMP smurf attack), TCP SYN (synchronize) flood attack, Ping flood attack and man in the middle attack . Various countermeasures for limiting IP spoofing are discussed in this paper