首页    期刊浏览 2025年07月02日 星期三
登录注册

文章基本信息

  • 标题:Various Techniques Involved in Detection and Controlling IP Spoofing
  • 本地全文:下载
  • 作者:Tanmay A. Abhang ; Dr. U. V. Kulkarni
  • 期刊名称:International Journal of Advanced Research In Computer Science and Software Engineering
  • 印刷版ISSN:2277-6451
  • 电子版ISSN:2277-128X
  • 出版年度:2013
  • 卷号:3
  • 期号:4
  • 出版社:S.S. Mishra
  • 摘要:The Internet protocol suite is commonly known as TCP/IP protocol suite, because of its two important pro-tocols, A) Transmission Control Protocol (TCP) and B) Internet Protocol (IP). IP spoofing, also known as IP address forgery is a technique in which an attacker attacks on a host by masquerading as a trusted host. Attacker does so by modifying the IP packet header with a forged or spoofed source IP address field. Main purpose behind IP spoofing is to conceal true identity of the sender by impersonating another computing system. By employing IP spoofing, attack-ers remain hidden from detection and put a considerable limitation on the destination network or victim for policing attack packets. In response to such attack the victim machine or network is misled to innocent network or host and drops subsequent packets from the same. IP spoofing has become a popular tool in various attacks like Distributed Denial of Service (DDoS) attack, Internet Control Message Protocol Magnification attack (ICMP smurf attack), TCP SYN (synchronize) flood attack, Ping flood attack and man in the middle attack . Various countermeasures for limiting IP spoofing are discussed in this paper
  • 关键词:IP spoofing; DDoS; TCP SYN flood; ICMP smurf attack; Packet filtering.
国家哲学社会科学文献中心版权所有