Academic literature on the topic 'IP Spoofing attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IP Spoofing attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IP Spoofing attack"
Alqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Full textN., D. Patel, Mehtre B.M., Wankar R., and Priyadarshi R. "Development of a Novel Methods for Detecting & Preventing the Spoofed attack Packets." International Journal of Microsystems and IoT 1, no. 2 (2023): 99–112. https://doi.org/10.5281/zenodo.8289269.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textAshok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.
Full textRaghu, Ram Chowdary Velevela. "A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks." Journal of Research and Review: Future Internet and Hyperconnectivity 1, no. 1 (2025): 31–39. https://doi.org/10.5281/zenodo.15111880.
Full textChai, Tze Uei, Hock Guan Goh, Soung-Yue Liew, and Vasaki Ponnusamy. "Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory." Systems 11, no. 4 (2023): 211. http://dx.doi.org/10.3390/systems11040211.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textMohammad Daud. "Detection of ARP Spoofing Attack by using ETTERCAP." Advances in Nonlinear Variational Inequalities 28, no. 4s (2025): 560–71. https://doi.org/10.52783/anvi.v28.3512.
Full textDissertations / Theses on the topic "IP Spoofing attack"
Israr, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.
Full textBook chapters on the topic "IP Spoofing attack"
Sunitha, T., V. Vijayashanthi, M. Navaneethakrishan, et al. "Key Observation to Prevent IP Spoofing in DDoS Attack on Cloud Environment." In Soft Computing: Theories and Applications. Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-19-9858-4_42.
Full textMeng, Yuxin, and Lam-for Kwok. "Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection." In Network and System Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_1.
Full textMoriyama, Eimatsu, Takeshi Takahashi, and Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.
Full textSrinivasarao, T., N. Leelavathy, S. Kailash Chandra Sri Satya Dev, I. Om Ganesh, P. Sai Aditya, and P. Sai Krishna. "ARP and DNS Spoofing Detection with Attacker IP Capturing." In Algorithms in Advanced Artificial Intelligence. CRC Press, 2024. http://dx.doi.org/10.1201/9781003529231-54.
Full textL., Kavisankar, Chellappan C., and Poovammal E. "Against Spoofing Attacks in Network Layer." In Advances in Digital Crime, Forensics, and Cyber Terrorism. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Research Anthology on Combating Denial-of-Service Attacks. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5348-0.ch030.
Full textVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network." In Advances in Wireless Technologies and Telecommunication. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.
Full textBhardwaj, Akashdeep. "Solutions for DDoS Attacks on Cloud Environment." In New Age Cyber Threat Mitigation for Cloud Computing Networks. BENTHAM SCIENCE PUBLISHERS, 2023. http://dx.doi.org/10.2174/9789815136111123010006.
Full textStevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Handbook of Research on Information Security and Assurance. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-59904-855-0.ch041.
Full textStevens, Dwayne, and David T. Green. "A Strategy for Enterprise VoIP Security." In Networking and Telecommunications. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-60566-986-1.ch093.
Full textConference papers on the topic "IP Spoofing attack"
Kleptsov, M. Y., and M. V. Katina. "A METHOD FOR DETECTING AND PREVENTING ARP-SPOOFING ATTACKS ON A COMPUTER NETWORK." In Intelligent transport systems. Russian University of Transport, 2024. http://dx.doi.org/10.30932/9785002446094-2024-611-616.
Full textMa, Yunji. "An Effective Method for Defense against IP Spoofing Attack." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601287.
Full textMopari, Indrajeet B., S. G. Pukale, and M. L. Dhore. "Detection of DDoS attack and defense against IP spoofing." In the International Conference. ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523200.
Full textMavani, Monali, and Krishna Asawa. "Experimental study of IP spoofing attack in 6LoWPAN network." In 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence). IEEE, 2017. http://dx.doi.org/10.1109/confluence.2017.7943192.
Full textMopari, I. B., S. G. Pukale, and M. L. Dhore. "Detection and defense against DDoS attack with IP spoofing." In 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787693.
Full textAgoni, Amakan Elisha, and Mqhele Dlodlo. "IP Spoofing Detection for Preventing DDoS Attack in Fog Computing." In 2018 Global Wireless Summit (GWS). IEEE, 2018. http://dx.doi.org/10.1109/gws.2018.8686626.
Full textParekh, Varsha, and Saravanan M. "A Hybrid Approach to Protect Server from IP Spoofing Attack." In 2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES). IEEE, 2022. http://dx.doi.org/10.1109/icses55317.2022.9914164.
Full textShaw, Shashi, and Prasenjit Choudhury. "A new local area network attack through IP and MAC address spoofing." In 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA). IEEE, 2015. http://dx.doi.org/10.1109/icacea.2015.7164728.
Full textOsanaiye, Opeyemi A. "Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing." In 2015 18th International Conference on Intelligence in Next Generation Networks (ICIN). IEEE, 2015. http://dx.doi.org/10.1109/icin.2015.7073820.
Full textUtomo, Suryo Pranoto, Bayu Pramudiono, and Andika Muharram. "Method to Uncover IP Spoofing Attack On Network Forensics Using NFAT And IP Correlation As Combined Approach." In 2019 International Conference on Information and Communications Technology (ICOIACT). IEEE, 2019. http://dx.doi.org/10.1109/icoiact46704.2019.8938476.
Full textReports on the topic "IP Spoofing attack"
Ferguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, 1998. http://dx.doi.org/10.17487/rfc2267.
Full textFerguson, P., and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2827.
Full text