Academic literature on the topic 'IP spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IP spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IP spoofing"
Thomsen, Dan. "IP spoofing and session hijacking." Network Security 1995, no. 3 (March 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.
Full textAlqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (October 31, 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Full textFonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, and Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.
Full textKim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement." Journal of Korean Institute of Information Technology 15, no. 8 (August 31, 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textLin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Full textKang, Jung-Ha, Yang Sun Lee, Jae Young Kim, and Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing." Journal of information and communication convergence engineering 12, no. 3 (September 30, 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.
Full textZhenhai Duan, Xin Yuan, and J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters." IEEE Transactions on Dependable and Secure Computing 5, no. 1 (January 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.
Full textEhrenkranz, Toby, and Jun Li. "On the state of IP spoofing defense." ACM Transactions on Internet Technology 9, no. 2 (May 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.
Full textYao, Guang, Jun Bi, and Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility." Computer Networks 57, no. 1 (January 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.
Full textDissertations / Theses on the topic "IP spoofing"
Ehrenkranz, Toby, and Toby Ehrenkranz. "Ensuring a Valid Source and Destination for Internet Traffic." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12445.
Full textIsrar, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.
Full textDušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.
Full textNEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.
Full textMarček, Ján. "Odposlech moderních šifrovaných protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Full textWu, Hung-I., and 吳宏毅. "IP Spoofing Detector." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43352837637508402538.
Full text國立中央大學
資訊工程研究所
95
In this project, we plan to develop a novice IP spoofing detection solution named IP Spoofing Detector (ISD) to solve this notorious security threat to computers and networks. ISD can accurately recognize whether an IP packet belongs to a TCP connection indicated in the TCP/IP header of that packet and drop all spoofed IP packets. As a result, attackers can no longer launch attacks through spoofed IP packets from the network protected by ISD. ISD will be an edge router-based solution to IP spoofing; hence, to install it there is no requirement to modify any software and hardware in any host of the protected network and there is no need to use any encryption and decryption method to authentication packets. After being installed, ISD can efficiently and effectively detect and block spoofed IP packets no matter how the layout of the protected network is changed and no matter whether mobile IPs are supported by the protected network. Since the IP spoofing problem was reported to the public by S. Bellovin of Bell Lab. in 1989, it have been used by many attackers to either conceal the attack sources (such as DoS/DDoS attacks, port scanning decoy, and IdlesScan) or forge packets as coming from hosts trusted by attacked hosts to get access to the attacked hosts (such as Man-in-the-Middle Attacks and trusted host attack). The former thwarts victims’ capability to make appropriate response to attack traffic. The later disables attacked hosts’ authentication mechanism. Both result in great damage on attacked hosts. According to FBI, in 2003, DoS/DDoS attacks alone caused about sixty-six million dollar lost in the USA. The trend of this kind of attacks continues increasing. According to TCP/IP protocol, the response of a socket to a packet changes when it is in a different state and the state of a socket changes after sending an IP packet. Based on the above principle, we can accurately confirm whether an IP packet was really sent by a specific socket. Besides, unless a 3-way handshaking is finished, a TCP connection can not be built; hence, for all packets claimed to belong to a TCP connection, ISD only needs to confirm the validity of the TCP SYN packet. The above rule can dramatically decrease the number of IP packets whose validity is needed to be verified. Based on the above analysis, we plan to develop and implement ISD on a Linux platform. The precision of the recognition of IDS could be to the socket level. Until now none of the IP spoofing detection solution could achieve such a fine precision level.
Wang, Shin-Cheng, and 王信正. "A new mechanism of IP spoofing packet filtering for the 3G network." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/02065797715130115466.
Full text國立中興大學
資訊科學與工程學系所
100
The launch of HSDPA and HSPA services in 3G network provides users more bandwidth for uplink and downlink.This allows more network applications to be achieved.The convenience of powerful smart phones makes mobile internet access more and more popular. However, for most mobile terminals,it is not easy and effective to foil virus or hack attacks.As a result,many mobile terminals will most likely to become Corpse computers. IP spoofing has often been exploited to conceal the attack sources since one cannot clearly identify the true source of the attacker.So it is difficult to prevent attacks.In this thesis, we use the GTP (GPRS Tunnelling Protocol) protocol characteristics to design a packet filtering mechanism. It can effectively prevent the 3G mobile devices from any of network attack based on IP spoofing method. Furthermore it can identify the source of attacker correctly.
Chuang, Yu-Chun, and 莊佑駿. "Design the upnp player which can play rmvb in Linux by using ip spoofing concept." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63368891590731595069.
Full text國立臺灣大學
資訊工程學研究所
96
Because the contribution of UPnP and DLNA, we can build a digit home. We can access the server which is set in home by using any device supported UPnP without installing any driver. Any multimedia put on the UPnP server can be used easier by any UPnP client. Both Linux and Windows have UPnP server software, so it is very easy to set up a UPnP environment. Both operating system have UPnP client, but all the player can not play rmvb movies. For example, mpeg movies can be played through UPnP by using streaming. But no player can play rmvb movies by using UPnP. We want to design a program to play rmvb movies through UPnP. We hope the server supported multimedia can hide the server IP when send the packets to client. This uses the IP spoofing concept to change the server IP when send the streaming packets. The client thinks the packets are come from the IP we change. We can avoid the server attacking by hacker.
Book chapters on the topic "IP spoofing"
Lagishetty, Shashank, Pruthvi Sabbu, and Kannan Srinathan. "DMIPS - Defensive Mechanism against IP Spoofing." In Information Security and Privacy, 276–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3_18.
Full textSingh, Vaishali, and S. K. Pandey. "Revisiting Cloud Security Threats: IP Spoofing." In Advances in Intelligent Systems and Computing, 225–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_21.
Full textMoriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing, 599–609. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.
Full textKováčik, Michal, Michal Kajan, and Martin Žádník. "Detecting IP Spoofing by Modelling History of IP Address Entry Points." In Lecture Notes in Computer Science, 73–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38998-6_9.
Full textRavi, Mangalam, S. Narasimman, G. K. Arun Kumar, and D. Karthikeyan. "A Cryptographic Approach to Defend against IP Spoofing." In Communications in Computer and Information Science, 290–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_47.
Full textMeng, Yuxin, and Lam-for Kwok. "Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection." In Network and System Security, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_1.
Full textKim, Mihui, and Kijoon Chae. "A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment." In Information Networking. Convergence in Broadband and Mobile Networking, 843–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_88.
Full textRamos, Manoel F., Bruno L. Dalmazo, and Jeferson C. Nobre. "A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking." In Computational Science and Its Applications – ICCSA 2019, 179–92. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24289-3_15.
Full textL., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism, 41–56. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication, 398–420. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.
Full textConference papers on the topic "IP spoofing"
Sahri, Nm, and Koji Okamura. "Protecting DNS services from IP spoofing." In CFI '16: The 11th International Conference on Future Internet Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.
Full textMukaddam, Ayman, Imad Elhajj, Ayman Kayssi, and Ali Chehab. "IP Spoofing Detection Using Modified Hop Count." In 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.62.
Full textJohn, Emil Kuriakose. "Efficient Defense System for IP Spoofing in Networks." In The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2416.
Full textGonzalez, J. M., M. Anwar, and J. B. D. Joshi. "A trust-based approach against IP-spoofing attacks." In 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971965.
Full textFarhat, Hikmat. "A scalable method to protect from IP spoofing." In 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664411.
Full textMa, Yunji. "An Effective Method for Defense against IP Spoofing Attack." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601287.
Full textMopari, Indrajeet B., S. G. Pukale, and M. L. Dhore. "Detection of DDoS attack and defense against IP spoofing." In the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523200.
Full textMavani, Monali, and Krishna Asawa. "Experimental study of IP spoofing attack in 6LoWPAN network." In 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence). IEEE, 2017. http://dx.doi.org/10.1109/confluence.2017.7943192.
Full textSanthosh, K. R., and C. Fancy. "A dedicated setup to identify spoofing via IP-traceback." In 2017 International Conference on Intelligent Sustainable Systems (ICISS). IEEE, 2017. http://dx.doi.org/10.1109/iss1.2017.8389316.
Full textMopari, I. B., S. G. Pukale, and M. L. Dhore. "Detection and defense against DDoS attack with IP spoofing." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787693.
Full textReports on the topic "IP spoofing"
Ferguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, May 2000. http://dx.doi.org/10.17487/rfc2827.
Full textFerguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, January 1998. http://dx.doi.org/10.17487/rfc2267.
Full text