Journal articles on the topic 'IP Spoofing attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IP Spoofing attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Alqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Full textN., D. Patel, Mehtre B.M., Wankar R., and Priyadarshi R. "Development of a Novel Methods for Detecting & Preventing the Spoofed attack Packets." International Journal of Microsystems and IoT 1, no. 2 (2023): 99–112. https://doi.org/10.5281/zenodo.8289269.
Full textHerman, Rusyadi Umar, and Agus Prasetyo. "Analysis of Address Resolution Protocol Poisoning Attacks on Mikrotik Routers Using Live Forensics Methods." International Journal of Engineering Business and Social Science 3, no. 4 (2025): 1–18. https://doi.org/10.58451/ijebss.v3i4.231.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textAshok, Bawge, and Joshi Dr.Harish. "Identifying ARP Spoofing Through Active Strategies." Research and Applications: Emerging Technologies 7, no. 2 (2025): 21–27. https://doi.org/10.5281/zenodo.15573429.
Full textRaghu, Ram Chowdary Velevela. "A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks." Journal of Research and Review: Future Internet and Hyperconnectivity 1, no. 1 (2025): 31–39. https://doi.org/10.5281/zenodo.15111880.
Full textChai, Tze Uei, Hock Guan Goh, Soung-Yue Liew, and Vasaki Ponnusamy. "Protection Schemes for DDoS, ARP Spoofing, and IP Fragmentation Attacks in Smart Factory." Systems 11, no. 4 (2023): 211. http://dx.doi.org/10.3390/systems11040211.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Defending a wireless LAN against ARP spoofing attacks using a Raspberry Pi." Basrah Researches Sciences 48, no. 2 (2022): 123–35. http://dx.doi.org/10.56714/bjrs.48.2.12.
Full textMohammad Daud. "Detection of ARP Spoofing Attack by using ETTERCAP." Advances in Nonlinear Variational Inequalities 28, no. 4s (2025): 560–71. https://doi.org/10.52783/anvi.v28.3512.
Full textShariff, Vahiduddin, Ruth Ramya K, B. Renuka Devi, Debnath Bhattacharyya, and Tai-hoon Kim. "A survey on existing IP trace back mechanisms and their comparisons." International Journal of Engineering & Technology 7, no. 1.9 (2018): 67. http://dx.doi.org/10.14419/ijet.v7i1.9.9972.
Full textRaju, Dr K. Butchi. "A Novel IP Traceback Scheme for Spoofing Attack." International Journal of Advanced engineering, Management and Science 3, no. 2 (2017): 1–6. http://dx.doi.org/10.24001/ijaems.3.2.1.
Full textKurabalakota, Gowthami, Divya Pasham, and Kanishka G. "ARP Spoofing in Action: An Ethical Approach to Network Security." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 245–49. https://doi.org/10.47001/irjiet/2025.inspire39.
Full textWijayanto, Agus, Imam Riadi, and Yudi Prayudi. "TAARA Method to Processing on the Network Forensics in the Event of an ARP Spoofing Attack." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 7, no. 2 (2023): 208–2017. http://dx.doi.org/10.29207/resti.v7i2.4589.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textStepanov, P. P., G. V. Nikonova, T. S. Pavlyuchenko, and V. V. Soloviev. "Features of Address Resolution Protocol Operation in Computer Networks." Programmnaya Ingeneria 13, no. 5 (2022): 211–18. http://dx.doi.org/10.17587/prin.13.211-218.
Full textLutfi Dwi Naldi and Apro Siswanto. "Design and Implement of Intrusion Prevention System Based on Snort and IP Tables." Journal of Computing Research and Innovation 10, no. 1 (2025): 89–97. https://doi.org/10.24191/jcrinn.v10i1.498.
Full textGattu, Hanudeep, Joshnitha Karimireddy, and Kanishka G. "DNS Under Siege: Ethical DNS Spoofing and Countermeasures." International Research Journal of Innovations in Engineering and Technology 09, Special Issue (2025): 250–54. https://doi.org/10.47001/irjiet/2025.inspire40.
Full textOroo Oyondi Felix. "TCP/IP stack transport layer performance, privacy, and security issues." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (2024): 175–200. http://dx.doi.org/10.30574/wjaets.2024.11.2.0098.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–24. http://dx.doi.org/10.22624/aims/digital/v11n2p2x.
Full textJimoh, Hammed O., and Mubarak O. Ahmed. "Analyzing Network Time Protocol (NTP) Based Amplification DDoS Attack and its Mitigation Techniques." Advances in Multidisciplinary & Scientific Research Journal Publications 12, no. 2 (2024): 17–36. http://dx.doi.org/10.22624/aims/digital/v11n2p2.
Full textBasim, Huda, and Turkan Ahmed. "An Improved Strategy for Detection and Prevention IP Spoofing Attack." International Journal of Computer Applications 182, no. 9 (2018): 28–31. http://dx.doi.org/10.5120/ijca2018917667.
Full textMavani, Monali, and Krishna Asawa. "Modeling and analyses of IP spoofing attack in 6LoWPAN network." Computers & Security 70 (September 2017): 95–110. http://dx.doi.org/10.1016/j.cose.2017.05.004.
Full textKang, Dong W., Joo H. Oh, Chae T. Im, Wan S. Yi, and Yoo J. Won. "A Practical Attack on Mobile Data Network Using IP Spoofing." Applied Mathematics & Information Sciences 7, no. 6 (2013): 2345–53. http://dx.doi.org/10.12785/amis/070626.
Full textNasser, Hiba Imad, and Mohammed Abdulridha Hussain. "Provably curb man-in-the-middle attack-based ARP spoofing in a local network." Bulletin of Electrical Engineering and Informatics 11, no. 4 (2022): 2280–91. http://dx.doi.org/10.11591/eei.v11i4.3810.
Full textSohidul Islam, Md, Md Sajjad, Mohammad Mahmudul Hasan, and Mohammad Sakib Islam Mazumder. "Phishing Attack Detecting System Using DNS and IP Filtering." Asian Journal of Computer Science and Technology 12, no. 1 (2023): 16–20. http://dx.doi.org/10.51983/ajcst-2023.12.1.3552.
Full textZhang, Chaoqin, Guangwu Hu, Guolong Chen, et al. "Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack." IEEE Access 6 (2018): 22764–77. http://dx.doi.org/10.1109/access.2017.2785236.
Full textSeo, Jung-Woo, and Sang-Jin Lee. "A study on the detection of DDoS attack using the IP Spoofing." Journal of the Korea Institute of Information Security and Cryptology 25, no. 1 (2015): 147–53. http://dx.doi.org/10.13089/jkiisc.2015.25.1.147.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering and Technology Research 4, no. 12 (2019): 65–70. http://dx.doi.org/10.24018/ejeng.2019.4.12.1644.
Full textYu, Tianfang, Lanlan Rui, and Xuesong Qiu. "SDNDefender: A Comprehensive DDoS Defense Mechanism Using Hybrid Approaches over Software Defined Networking." Security and Communication Networks 2021 (October 18, 2021): 1–22. http://dx.doi.org/10.1155/2021/5097267.
Full textMohd Yusof, Nur Nadiah, and Noor Suhana Sulaiman. "Cyber Attack Detection Dataset: A Review." Journal of Physics: Conference Series 2319, no. 1 (2022): 012029. http://dx.doi.org/10.1088/1742-6596/2319/1/012029.
Full textDiash Firdaus, Afin Afin, Idi Sumardi, and Chalifa Chazar. "Deteksi Serangan Pada Jaringan Internet Of Things Medis Menggunakan Machine Learning Dengan Algoritma XGBoost." Cyber Security dan Forensik Digital 8, no. 1 (2025): 34–42. https://doi.org/10.14421/csecurity.2025.8.1.5036.
Full textMurugan, K., and P. Varalakshmi. "IP Spoofing Attack Mitigation using Extreme Learning Machine to Promote Secure Data Transmission." Asian Journal of Research in Social Sciences and Humanities 6, no. 6 (2016): 394. http://dx.doi.org/10.5958/2249-7315.2016.00217.3.
Full textYan, Jingchen, Zhe Du, Jifang Li, Shiduo Yang, Jinghao Li, and Jianbin Li. "A Threat Intelligence Analysis Method Based on Feature Weighting and BERT-BiGRU for Industrial Internet of Things." Security and Communication Networks 2022 (February 25, 2022): 1–11. http://dx.doi.org/10.1155/2022/7729456.
Full textLee, Hae-Dong, Hyeon-Tae Ha, Hyun-Chul Baek, Chang-Gun Kim, and Sang-Bok Kim. "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts." Journal of the Korean Institute of Information and Communication Engineering 16, no. 12 (2012): 2649–56. http://dx.doi.org/10.6109/jkiice.2012.16.12.2649.
Full textZhou, Qizhao, Junqing Yu, and Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks." Security and Communication Networks 2021 (September 21, 2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.
Full textSharma, Vedna, and Monika Thakur. "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification." International Journal of Computer Trends and Technology 42, no. 2 (2016): 117–23. http://dx.doi.org/10.14445/22312803/ijctt-v42p120.
Full textHafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.
Full textMomot, Vladyslav, and Volodymyr Porokhniak. "Research of methods for counteracting Transport Layer attacks in information and communication networks." Problemi telekomunìkacìj, no. 2(35) (November 28, 2024): 26–46. https://doi.org/10.30837/pt.2024.2.03.
Full textNafir, Abdenacer, Smaine Mazouzi, and Salim Chikhi. "A New Information-Based Heuristic for Distributed DDoS Detection and Mitigation." International Journal of Organizational and Collective Intelligence 12, no. 4 (2022): 1–16. http://dx.doi.org/10.4018/ijoci.312221.
Full textNasir, Manir, Danlami Gabi, Salihu Alhassan Libata, and Mujtaba Haruna. "COUNTERMEASURE TO MAN-IN-THE-MIDDLE ATTACK BASED ON EMAIL HIJACKING USING TRY-HYBRID SUPERVISED LEARNING TECHNIQUES." FUDMA JOURNAL OF SCIENCES 9, no. 2 (2025): 66–74. https://doi.org/10.33003/fjs-2025-0902-3062.
Full textYazov, Yuri, Oleg Avsentev, Alexander Avsentev, and Irina Rubtsova. "Method for Assessing Effectiveness of Protection of Electronic Document Management using the Petri and Markov Nets Apparatus." SPIIRAS Proceedings 18, no. 6 (2019): 1269–300. http://dx.doi.org/10.15622/sp.2019.18.6.1269-1300.
Full textAlquhayz, Hani, Nasser Alalwan, Ahmed Ibrahim Alzahrani, Ali H. Al-Bayatti, and Mhd Saeed Sharif. "Policy-Based Security Management System for 5G Heterogeneous Networks." Wireless Communications and Mobile Computing 2019 (November 14, 2019): 1–14. http://dx.doi.org/10.1155/2019/4582391.
Full textSöğüt, Esra, and O. Ayhan Erdem. "A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems." Applied Sciences 13, no. 10 (2023): 5993. http://dx.doi.org/10.3390/app13105993.
Full textATC. "INFORMATION CENTRIC NETWORKS AND ITS SECURITY CHALLENGES." Journal of Data Acquistion an Processing 38, no. 3 (2023): 5160–83. https://doi.org/10.5281/zenodo.14333572.
Full textDr., N. Arumugam. "A Survey of Network Based Detection and Defense Mechanisms Countering the IP Spoofing Problems." International Journal of Trend in Scientific Research and Development 2, no. 5 (2018): 704–10. https://doi.org/10.31142/ijtsrd15921.
Full textDr., Harish Joshi, Ashok Bawge Prof., Uzma Kausar Prof., Rishikesh, Pratiksha, and Hinn Benny. "Mitigating ARP Poisoning Via Modified ICMP and Voting Mechanism." Journal of Research in Electrical Power System 1, no. 2 (2025): 8–16. https://doi.org/10.5281/zenodo.15573683.
Full textSudhakaran, Pradeep. "Detection of Spoofing Attacks on SDN through IP Trace Back Protocol." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (2020): 55–61. http://dx.doi.org/10.5373/jardcs/v12sp4/20201466.
Full textLin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Full text