Academic literature on the topic 'IP spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IP spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IP spoofing"
Thomsen, Dan. "IP spoofing and session hijacking." Network Security 1995, no. 3 (1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.
Full textAlqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Full textFonseca, Osvaldo, Italo Cunha, Elverton Fazzion, et al. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.
Full textKim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement." Journal of Korean Institute of Information Technology 15, no. 8 (2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textLin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Full textKang, Jung-Ha, Yang Sun Lee, Jae Young Kim, and Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing." Journal of information and communication convergence engineering 12, no. 3 (2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.
Full textZhenhai Duan, Xin Yuan, and J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters." IEEE Transactions on Dependable and Secure Computing 5, no. 1 (2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.
Full textEhrenkranz, Toby, and Jun Li. "On the state of IP spoofing defense." ACM Transactions on Internet Technology 9, no. 2 (2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.
Full textYao, Guang, Jun Bi, and Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility." Computer Networks 57, no. 1 (2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.
Full textDissertations / Theses on the topic "IP spoofing"
Ehrenkranz, Toby, and Toby Ehrenkranz. "Ensuring a Valid Source and Destination for Internet Traffic." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12445.
Full textIsrar, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.
Full textDušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.
Full textNEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textWu, Hung-I., and 吳宏毅. "IP Spoofing Detector." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43352837637508402538.
Full textWang, Shin-Cheng, and 王信正. "A new mechanism of IP spoofing packet filtering for the 3G network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/02065797715130115466.
Full textChuang, Yu-Chun, and 莊佑駿. "Design the upnp player which can play rmvb in Linux by using ip spoofing concept." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63368891590731595069.
Full textBook chapters on the topic "IP spoofing"
Lagishetty, Shashank, Pruthvi Sabbu, and Kannan Srinathan. "DMIPS - Defensive Mechanism against IP Spoofing." In Information Security and Privacy. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3_18.
Full textSingh, Vaishali, and S. K. Pandey. "Revisiting Cloud Security Threats: IP Spoofing." In Advances in Intelligent Systems and Computing. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_21.
Full textMoriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.
Full textKováčik, Michal, Michal Kajan, and Martin Žádník. "Detecting IP Spoofing by Modelling History of IP Address Entry Points." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38998-6_9.
Full textRavi, Mangalam, S. Narasimman, G. K. Arun Kumar, and D. Karthikeyan. "A Cryptographic Approach to Defend against IP Spoofing." In Communications in Computer and Information Science. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_47.
Full textMeng, Yuxin, and Lam-for Kwok. "Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection." In Network and System Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_1.
Full textKim, Mihui, and Kijoon Chae. "A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment." In Information Networking. Convergence in Broadband and Mobile Networking. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_88.
Full textRamos, Manoel F., Bruno L. Dalmazo, and Jeferson C. Nobre. "A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking." In Computational Science and Its Applications – ICCSA 2019. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24289-3_15.
Full textL., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.
Full textConference papers on the topic "IP spoofing"
Sahri, Nm, and Koji Okamura. "Protecting DNS services from IP spoofing." In CFI '16: The 11th International Conference on Future Internet Technologies. ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.
Full textMukaddam, Ayman, Imad Elhajj, Ayman Kayssi, and Ali Chehab. "IP Spoofing Detection Using Modified Hop Count." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.62.
Full textJohn, Emil Kuriakose. "Efficient Defense System for IP Spoofing in Networks." In The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2416.
Full textGonzalez, J. M., M. Anwar, and J. B. D. Joshi. "A trust-based approach against IP-spoofing attacks." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971965.
Full textFarhat, Hikmat. "A scalable method to protect from IP spoofing." In 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664411.
Full textMa, Yunji. "An Effective Method for Defense against IP Spoofing Attack." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601287.
Full textMopari, Indrajeet B., S. G. Pukale, and M. L. Dhore. "Detection of DDoS attack and defense against IP spoofing." In the International Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523200.
Full textMavani, Monali, and Krishna Asawa. "Experimental study of IP spoofing attack in 6LoWPAN network." In 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence). IEEE, 2017. http://dx.doi.org/10.1109/confluence.2017.7943192.
Full textSanthosh, K. R., and C. Fancy. "A dedicated setup to identify spoofing via IP-traceback." In 2017 International Conference on Intelligent Sustainable Systems (ICISS). IEEE, 2017. http://dx.doi.org/10.1109/iss1.2017.8389316.
Full textMopari, I. B., S. G. Pukale, and M. L. Dhore. "Detection and defense against DDoS attack with IP spoofing." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787693.
Full textReports on the topic "IP spoofing"
Ferguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2827.
Full textFerguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2267.
Full text