Journal articles on the topic 'IP spoofing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IP spoofing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Thomsen, Dan. "IP spoofing and session hijacking." Network Security 1995, no. 3 (March 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.
Full textAlqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (October 31, 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Full textFonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, and Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.
Full textKim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement." Journal of Korean Institute of Information Technology 15, no. 8 (August 31, 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.
Full textVeeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Full textLin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Full textKang, Jung-Ha, Yang Sun Lee, Jae Young Kim, and Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing." Journal of information and communication convergence engineering 12, no. 3 (September 30, 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.
Full textZhenhai Duan, Xin Yuan, and J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters." IEEE Transactions on Dependable and Secure Computing 5, no. 1 (January 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.
Full textEhrenkranz, Toby, and Jun Li. "On the state of IP spoofing defense." ACM Transactions on Internet Technology 9, no. 2 (May 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.
Full textYao, Guang, Jun Bi, and Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility." Computer Networks 57, no. 1 (January 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.
Full textVlajic, Natalija, Mashruf Chowdhury, and Marin Litoiu. "IP Spoofing In and Out of the Public Cloud: From Policy to Practice." Computers 8, no. 4 (November 9, 2019): 81. http://dx.doi.org/10.3390/computers8040081.
Full textRaju, Dr K. Butchi. "A Novel IP Traceback Scheme for Spoofing Attack." International Journal of Advanced engineering, Management and Science 3, no. 2 (2017): 1–6. http://dx.doi.org/10.24001/ijaems.3.2.1.
Full textSahni, Sarita, and Pankaj Jagtap. "A Survey of Defence Mechanisms against IP Spoofing." IARJSET 4, no. 7 (July 20, 2017): 20–27. http://dx.doi.org/10.17148/iarjset.2017.4704.
Full textBenson Edwin Raj, S., V. S. Jayanthi, and R. Shalini. "A Novel Approach for the Early Detection and Identification of Botnets." Advanced Materials Research 403-408 (November 2011): 4469–75. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4469.
Full textPark, Sun-Hee, Dong-Il Yang, Kwang-Youn Jin, and Hyung-Jin Choi. "A Modeling of Forensics for Mobile IP Spoofing Prevention." Journal of Korea Navigation Institute 16, no. 2 (April 30, 2012): 307–17. http://dx.doi.org/10.12673/jkoni.2012.16.2.307.
Full textSudi Lema, Hussein. "Preventing IP Spoofing Attacks in a Shared Resources Network." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 144–51. http://dx.doi.org/10.17781/p002575.
Full textSudhakaran, Pradeep. "Detection of Spoofing Attacks on SDN through IP Trace Back Protocol." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 55–61. http://dx.doi.org/10.5373/jardcs/v12sp4/20201466.
Full textShariff, Vahiduddin, Ruth Ramya K, B. Renuka Devi, Debnath Bhattacharyya, and Tai-hoon Kim. "A survey on existing IP trace back mechanisms and their comparisons." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 67. http://dx.doi.org/10.14419/ijet.v7i1.9.9972.
Full textBasim, Huda, and Turkan Ahmed. "An Improved Strategy for Detection and Prevention IP Spoofing Attack." International Journal of Computer Applications 182, no. 9 (August 14, 2018): 28–31. http://dx.doi.org/10.5120/ijca2018917667.
Full textKang, Dong W., Joo H. Oh, Chae T. Im, Wan S. Yi, and Yoo J. Won. "A Practical Attack on Mobile Data Network Using IP Spoofing." Applied Mathematics & Information Sciences 7, no. 6 (November 1, 2013): 2345–53. http://dx.doi.org/10.12785/amis/070626.
Full textMavani, Monali, and Krishna Asawa. "Modeling and analyses of IP spoofing attack in 6LoWPAN network." Computers & Security 70 (September 2017): 95–110. http://dx.doi.org/10.1016/j.cose.2017.05.004.
Full textSeo, Jung-Woo, and Sang-Jin Lee. "A study on the detection of DDoS attack using the IP Spoofing." Journal of the Korea Institute of Information Security and Cryptology 25, no. 1 (February 28, 2015): 147–53. http://dx.doi.org/10.13089/jkiisc.2015.25.1.147.
Full textKIM, Tae Hwan, Dong Seong KIM, and Hee Young JUNG. "Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach." IEICE Transactions on Communications E99.B, no. 7 (2016): 1511–22. http://dx.doi.org/10.1587/transcom.2015ebp3457.
Full textSrinath, D., J. Janet, and Jose Anand. "A Survey of Routing Instability with IP Spoofing on the Internet." Asian Journal of Information Technology 9, no. 3 (March 1, 2010): 154–58. http://dx.doi.org/10.3923/ajit.2010.154.158.
Full textZhang, Chaoqin, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan, and Weijin Jiang. "Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack." IEEE Access 6 (2018): 22764–77. http://dx.doi.org/10.1109/access.2017.2785236.
Full textKIM, M. "Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 7 (July 1, 2006): 1959–67. http://dx.doi.org/10.1093/ietfec/e89-a.7.1959.
Full textLu, XiCheng, GaoFeng Lü, PeiDong Zhu, and YiJiao Chen. "MASK: An efficient mechanism to extend inter-domain IP spoofing preventions." Science in China Series F: Information Sciences 51, no. 11 (October 16, 2008): 1745–60. http://dx.doi.org/10.1007/s11432-008-0144-8.
Full textNarendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (March 20, 2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.
Full textArumugam, Dr N. "A Survey of Network-Based Detection and Defense Mechanisms Countering the IP Spoofing Problems." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 704–10. http://dx.doi.org/10.31142/ijtsrd15921.
Full textBhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.
Full textBi, Jun, Bingyang Liu, Jianping Wu, and Yan Shen. "Preventing IP source address spoofing: A two-level, state machine-based method." Tsinghua Science and Technology 14, no. 4 (August 2009): 413–22. http://dx.doi.org/10.1016/s1007-0214(09)70097-5.
Full textBharti, Abhishek. "Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography." IOSR Journal of Computer Engineering 13, no. 2 (2013): 66–73. http://dx.doi.org/10.9790/0661-1326673.
Full textMurugan, K., and P. Varalakshmi. "IP Spoofing Attack Mitigation using Extreme Learning Machine to Promote Secure Data Transmission." Asian Journal of Research in Social Sciences and Humanities 6, no. 6 (2016): 394. http://dx.doi.org/10.5958/2249-7315.2016.00217.3.
Full textArumugam, N. "A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm." IOSR Journal of Engineering 02, no. 10 (October 2012): 09–16. http://dx.doi.org/10.9790/3021-021020916.
Full textYaar, A., A. Perrig, and D. Song. "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense." IEEE Journal on Selected Areas in Communications 24, no. 10 (October 2006): 1853–63. http://dx.doi.org/10.1109/jsac.2006.877138.
Full textVelmayil, G., and S. Pannirselvam. "Detection and Removal of IP Spoofing through Extended-Inter Domain Packet Filter Architecture." International Journal of Computer Applications 49, no. 17 (July 28, 2012): 37–43. http://dx.doi.org/10.5120/7723-1126.
Full textLopes, Paulo, Paulo Salvador, and António Nogueira. "Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks." Network Protocols and Algorithms 5, no. 3 (October 31, 2013): 153. http://dx.doi.org/10.5296/npa.v5i3.4316.
Full textLee, Hae-Dong, Hyeon-Tae Ha, Hyun-Chul Baek, Chang-Gun Kim, and Sang-Bok Kim. "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts." Journal of the Korean Institute of Information and Communication Engineering 16, no. 12 (December 31, 2012): 2649–56. http://dx.doi.org/10.6109/jkiice.2012.16.12.2649.
Full textYang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.
Full textRahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (December 17, 2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.
Full textYang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing." Applied Mechanics and Materials 484-485 (January 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.
Full textSong, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.
Full textLi, Pengkun, Jinshu Su, Xiaofeng Wang, and Qianqian Xing. "DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability." Security and Communication Networks 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/1974493.
Full textHafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (August 21, 2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.
Full textZhou, Qizhao, Junqing Yu, and Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks." Security and Communication Networks 2021 (September 21, 2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.
Full textNarayanan, Arumugam, and Venkatesh Chakrapani. "Triangular fuzzy based classification of IP request to detect spoofing request in data network." International Journal of Physical Sciences 8, no. 20 (May 30, 2013): 1074–79. http://dx.doi.org/10.5897/ijps12.639.
Full textShah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (September 28, 2019): 1095. http://dx.doi.org/10.3390/electronics8101095.
Full textVelmayil, G., and S. Pannirselvam. "Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System." International Journal of Computer Network and Information Security 5, no. 5 (April 16, 2013): 47–54. http://dx.doi.org/10.5815/ijcnis.2013.05.06.
Full textSharma, Vedna, and Monika Thakur. "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification." International Journal of Computer Trends and Technology 42, no. 2 (December 25, 2016): 117–23. http://dx.doi.org/10.14445/22312803/ijctt-v42p120.
Full textKovács, Márk, Péter András Agg, and Zsolt Csaba Johanyák. "SDMN Architecture in 5G." Műszaki Tudományos Közlemények 13, no. 1 (October 1, 2020): 101–4. http://dx.doi.org/10.33894/mtk-2020.13.17.
Full text