To see the other types of publications on this topic, follow the link: IP spoofing.

Journal articles on the topic 'IP spoofing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'IP spoofing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Thomsen, Dan. "IP spoofing and session hijacking." Network Security 1995, no. 3 (March 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alqurashi, Reem K., Ohoud S. Al-harthi, and Sabah M. Alzahrani. "Detection of IP Spoofing Attack." International Journal of Engineering Research and Technology 13, no. 10 (October 31, 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, and Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing." IEEE Transactions on Network and Service Management 18, no. 3 (September 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement." Journal of Korean Institute of Information Technology 15, no. 8 (August 31, 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Veeraraghavan, Prakash, Dalal Hanna, and Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network." Electronics 9, no. 9 (September 14, 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Full text
Abstract:
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Jin Cherng, Men Jue Koo, and Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection." Applied Mechanics and Materials 284-287 (January 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.

Full text
Abstract:
IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.
APA, Harvard, Vancouver, ISO, and other styles
7

Kang, Jung-Ha, Yang Sun Lee, Jae Young Kim, and Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing." Journal of information and communication convergence engineering 12, no. 3 (September 30, 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhenhai Duan, Xin Yuan, and J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters." IEEE Transactions on Dependable and Secure Computing 5, no. 1 (January 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ehrenkranz, Toby, and Jun Li. "On the state of IP spoofing defense." ACM Transactions on Internet Technology 9, no. 2 (May 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Yao, Guang, Jun Bi, and Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility." Computer Networks 57, no. 1 (January 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Vlajic, Natalija, Mashruf Chowdhury, and Marin Litoiu. "IP Spoofing In and Out of the Public Cloud: From Policy to Practice." Computers 8, no. 4 (November 9, 2019): 81. http://dx.doi.org/10.3390/computers8040081.

Full text
Abstract:
In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the increased tightening of regulations and controls against IP spoofing by world-wide Internet service providers (ISPs). Three main contributions of this paper are (1) For the first time in the research literature, we provide a comprehensive look at a number of possible attacks that involve the transmission of spoofed packets from or towards the virtual private servers hosted by a public Cloud provider. (2) We summarize the key findings of our research on the regulation of IP spoofing in the acceptable-use and term-of-service policies of 35 real-world Cloud providers. The findings reveal that in over 50% of cases, these policies make no explicit mention or prohibition of IP spoofing, thus failing to serve as a potential deterrent. (3) Finally, we describe the results of our experimental study on the actual practical feasibility of IP spoofing involving a select number of real-world Cloud providers. These results show that most of the tested public Cloud providers do a very good job of preventing (potential) hackers from using their virtual private servers to launch spoofed-IP campaigns on third-party targets. However, the same very own virtual private servers of these Cloud providers appear themselves vulnerable to a number of attacks that involve the use of spoofed IP packets and/or could be deployed as packet-reflectors in attacks on third party targets. We hope the paper serves as a call for awareness and action and motivates the public Cloud providers to deploy better techniques for detection and elimination of spoofed IP traffic.
APA, Harvard, Vancouver, ISO, and other styles
12

Raju, Dr K. Butchi. "A Novel IP Traceback Scheme for Spoofing Attack." International Journal of Advanced engineering, Management and Science 3, no. 2 (2017): 1–6. http://dx.doi.org/10.24001/ijaems.3.2.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Sahni, Sarita, and Pankaj Jagtap. "A Survey of Defence Mechanisms against IP Spoofing." IARJSET 4, no. 7 (July 20, 2017): 20–27. http://dx.doi.org/10.17148/iarjset.2017.4704.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Benson Edwin Raj, S., V. S. Jayanthi, and R. Shalini. "A Novel Approach for the Early Detection and Identification of Botnets." Advanced Materials Research 403-408 (November 2011): 4469–75. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4469.

Full text
Abstract:
Botnets are growing in size, number and impact. It continues to be one of the top three web threats that mankind has ever known. The botnets are the souped-up cyber engines driving nearly all criminal commerce on the Internet and are seen as relaying millions of pieces of junk e-mail, or spam. Thus, the need of the hour is the early detection and identification of the heart of network packet flooding or the C&C centre. Most of the botmasters perform DDos attacks on a target server by spoofing the source IP address. The existing botnet detection techniques rely on machine learning algorithms and do not expound the IP spoofing issue. These approaches are also found to be unsuccessful in the meticulous identification of the botmasters. Here we propose an architecture that depend on the PSO-based IP tracebacking. Our architecture also introduces the IP spoofing detector unit so as to ensure that the Traceback moves in the right direction. The approach also detects the zombies and utilizes the PSO optimization technique that aid in the identification of the C&C node. The experimental results show that our approach is successful in prompt detection of the bots.
APA, Harvard, Vancouver, ISO, and other styles
15

Park, Sun-Hee, Dong-Il Yang, Kwang-Youn Jin, and Hyung-Jin Choi. "A Modeling of Forensics for Mobile IP Spoofing Prevention." Journal of Korea Navigation Institute 16, no. 2 (April 30, 2012): 307–17. http://dx.doi.org/10.12673/jkoni.2012.16.2.307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Sudi Lema, Hussein. "Preventing IP Spoofing Attacks in a Shared Resources Network." International Journal of Cyber-Security and Digital Forensics 8, no. 2 (2019): 144–51. http://dx.doi.org/10.17781/p002575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sudhakaran, Pradeep. "Detection of Spoofing Attacks on SDN through IP Trace Back Protocol." Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (March 31, 2020): 55–61. http://dx.doi.org/10.5373/jardcs/v12sp4/20201466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Shariff, Vahiduddin, Ruth Ramya K, B. Renuka Devi, Debnath Bhattacharyya, and Tai-hoon Kim. "A survey on existing IP trace back mechanisms and their comparisons." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 67. http://dx.doi.org/10.14419/ijet.v7i1.9.9972.

Full text
Abstract:
Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attackers launch the attack by spoofing the source address, once this happens they can attack without revealing their exact location. The attacker uses a fraudulent IP address to conceal their identity. To reveal the attackers real locations many IP trace back mechanisms have been proposed but the attacker immediately gets away with the information. There is another problem which is to detect DDoS traffic and the precarious packets set up by the attacker, which are a threat to the victim as well as the whole network, here lies another hurdle which is to differentiate between the attacker’s data traffic from the normal data traffic. There are many solutions given for this but one among them is IP trace back which already has researched upon in the past and implemented then, but what is lacking in the solution such that the attacks are even now taking place. IP trace back if modified, strengthened would analyze the traffic faster and trace out the attacker with a faster pace, which is why a hybrid IP tracing and tracking mechanism if introduced could ease the current problem.
APA, Harvard, Vancouver, ISO, and other styles
19

Basim, Huda, and Turkan Ahmed. "An Improved Strategy for Detection and Prevention IP Spoofing Attack." International Journal of Computer Applications 182, no. 9 (August 14, 2018): 28–31. http://dx.doi.org/10.5120/ijca2018917667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Kang, Dong W., Joo H. Oh, Chae T. Im, Wan S. Yi, and Yoo J. Won. "A Practical Attack on Mobile Data Network Using IP Spoofing." Applied Mathematics & Information Sciences 7, no. 6 (November 1, 2013): 2345–53. http://dx.doi.org/10.12785/amis/070626.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Mavani, Monali, and Krishna Asawa. "Modeling and analyses of IP spoofing attack in 6LoWPAN network." Computers & Security 70 (September 2017): 95–110. http://dx.doi.org/10.1016/j.cose.2017.05.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Seo, Jung-Woo, and Sang-Jin Lee. "A study on the detection of DDoS attack using the IP Spoofing." Journal of the Korea Institute of Information Security and Cryptology 25, no. 1 (February 28, 2015): 147–53. http://dx.doi.org/10.13089/jkiisc.2015.25.1.147.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

KIM, Tae Hwan, Dong Seong KIM, and Hee Young JUNG. "Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach." IEICE Transactions on Communications E99.B, no. 7 (2016): 1511–22. http://dx.doi.org/10.1587/transcom.2015ebp3457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Srinath, D., J. Janet, and Jose Anand. "A Survey of Routing Instability with IP Spoofing on the Internet." Asian Journal of Information Technology 9, no. 3 (March 1, 2010): 154–58. http://dx.doi.org/10.3923/ajit.2010.154.158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Zhang, Chaoqin, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan, and Weijin Jiang. "Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack." IEEE Access 6 (2018): 22764–77. http://dx.doi.org/10.1109/access.2017.2785236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

KIM, M. "Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 7 (July 1, 2006): 1959–67. http://dx.doi.org/10.1093/ietfec/e89-a.7.1959.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lu, XiCheng, GaoFeng Lü, PeiDong Zhu, and YiJiao Chen. "MASK: An efficient mechanism to extend inter-domain IP spoofing preventions." Science in China Series F: Information Sciences 51, no. 11 (October 16, 2008): 1745–60. http://dx.doi.org/10.1007/s11432-008-0144-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Narendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (March 20, 2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.

Full text
Abstract:
The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current internet packet delivery only depends on packet destination IP address and forward devices neglect the validation of packet’s IP source address. It makes attacks can leverage this flow to launch attacks with forge IP source address so as to meet their violent purpose and avoid to be tracked. In order to reduce this threat and enhance internet accountability, many solution proposed in the inter domain and intra domain aspects. Furthermore, most of them faced with some issues hard to cope, i.e., data security, data privacy. And most importantly code cover PureVPN protocol for both inter and intra domain areas. The novel network architecture of SDN possess whole network PureVPN protocol rule instead of traditional SDN switches, which brings good opportunity to solve IP spoofing problems. However, use authentication based on key exchange between the machines on your network; something like IP Security protocol will significantly cut down on the risk of spoofing. This paper proposes a SDN based PureVPN protocol architecture, which can cover both inter and intra domain areas with encrypted format effectively than SDN devices. The PureVPN protocol scheme is significant in improving the security and privacy in SDN for IoT.
APA, Harvard, Vancouver, ISO, and other styles
29

Arumugam, Dr N. "A Survey of Network-Based Detection and Defense Mechanisms Countering the IP Spoofing Problems." International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (August 31, 2018): 704–10. http://dx.doi.org/10.31142/ijtsrd15921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Bhavani, Y., V. Janaki, and R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback." Oriental journal of computer science and technology 10, no. 2 (June 6, 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Full text
Abstract:
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.
APA, Harvard, Vancouver, ISO, and other styles
31

Bi, Jun, Bingyang Liu, Jianping Wu, and Yan Shen. "Preventing IP source address spoofing: A two-level, state machine-based method." Tsinghua Science and Technology 14, no. 4 (August 2009): 413–22. http://dx.doi.org/10.1016/s1007-0214(09)70097-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Bharti, Abhishek. "Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography." IOSR Journal of Computer Engineering 13, no. 2 (2013): 66–73. http://dx.doi.org/10.9790/0661-1326673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Murugan, K., and P. Varalakshmi. "IP Spoofing Attack Mitigation using Extreme Learning Machine to Promote Secure Data Transmission." Asian Journal of Research in Social Sciences and Humanities 6, no. 6 (2016): 394. http://dx.doi.org/10.5958/2249-7315.2016.00217.3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Arumugam, N. "A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm." IOSR Journal of Engineering 02, no. 10 (October 2012): 09–16. http://dx.doi.org/10.9790/3021-021020916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Yaar, A., A. Perrig, and D. Song. "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense." IEEE Journal on Selected Areas in Communications 24, no. 10 (October 2006): 1853–63. http://dx.doi.org/10.1109/jsac.2006.877138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Velmayil, G., and S. Pannirselvam. "Detection and Removal of IP Spoofing through Extended-Inter Domain Packet Filter Architecture." International Journal of Computer Applications 49, no. 17 (July 28, 2012): 37–43. http://dx.doi.org/10.5120/7723-1126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Lopes, Paulo, Paulo Salvador, and António Nogueira. "Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks." Network Protocols and Algorithms 5, no. 3 (October 31, 2013): 153. http://dx.doi.org/10.5296/npa.v5i3.4316.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Hae-Dong, Hyeon-Tae Ha, Hyun-Chul Baek, Chang-Gun Kim, and Sang-Bok Kim. "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts." Journal of the Korean Institute of Information and Communication Engineering 16, no. 12 (December 31, 2012): 2649–56. http://dx.doi.org/10.6109/jkiice.2012.16.12.2649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.

Full text
Abstract:
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header’s ID and offset fields to mark packets, so it inevitably suffers from fragment and drop issues for its packet reassembly. Although the 16-bit hybrid IP traceback schemes, for example, MORE, can mitigate the fragment problem, their storage requirement grows up with packet numbers. To solve the storage and fragment problems in one shot, we propose a single-packet IP traceback scheme that only uses packets’ ID field for marking. Our major contributions are as follows: (1) our fragmented packets with tracing marks can be reassembled; (2) our storage is not affected by packet numbers; (3) it is the first hybrid single-packet IP traceback scheme to achieve zero false positive and zero false negative rates.
APA, Harvard, Vancouver, ISO, and other styles
40

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker, and Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network." European Journal of Engineering Research and Science 4, no. 12 (December 17, 2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.

Full text
Abstract:
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent those malicious nodes from sending spoof reply by securing both NS and NA messages. The proposed Advanced Bits Security (ABS) technique is based on Blake2 algorithm and introducing a creative option called ABS field that holds the hash value of tentative IP address and attached to both NA and NS message. We expect the ABS technique can prevent spoof reply during DAD procedure in link local network and can prevent DoS attack
APA, Harvard, Vancouver, ISO, and other styles
41

Yang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing." Applied Mechanics and Materials 484-485 (January 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.

Full text
Abstract:
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol ARP virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the ARP Find virus source and virus removal methods, and finally putting forward effective measures to guard against ARP virus.
APA, Harvard, Vancouver, ISO, and other styles
42

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong, and Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Full text
Abstract:
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
APA, Harvard, Vancouver, ISO, and other styles
43

Li, Pengkun, Jinshu Su, Xiaofeng Wang, and Qianqian Xing. "DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability." Security and Communication Networks 2021 (July 19, 2021): 1–17. http://dx.doi.org/10.1155/2021/1974493.

Full text
Abstract:
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and DDoS attacks. Global PKI-based accountable network involves harmful centralized authority abuse and complex certificate management. The inherently accountable network with self-certifying addresses is incompatible with the current Internet and faces the difficulty of revoking and updating keys. This study presents DIIA, a blockchain-based decentralized infrastructure to provide accountability for the current Internet. Specifically, DIIA designs a public-permissioned blockchain called TIPchain to act as a decentralized trust anchor, allowing cryptographic authentication of IP addresses without any global trusted authority. DIIA also proposes the revocable trustworthy IP address bound to the cryptographic key, which supports automatic key renewal and efficient key revocation and eliminates complexity certificate management. We present several security mechanisms based on DIIA to show how DIIA can help to enhance network layer security. We also implement a prototype system and experiment with real-world data. The results demonstrate the feasibility and suitability of our work in practice.
APA, Harvard, Vancouver, ISO, and other styles
44

Hafizh, M. Nasir, Imam Riadi, and Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic." Jurnal Telekomunikasi dan Komputer 10, no. 2 (August 21, 2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.

Full text
Abstract:
Pada jaringan komputer, protokol yang bertugas untuk untuk menerjemahkan IP address menjadi MAC Address adalah Address Resolution Protocol (ARP). Sifat stateless pada protokol ARP, menyebabkan protokol ARP memiliki celah dari segi keamanan. Celah ini dapat menimbulkan serangan terhadap ARP Protocol, disebabkan karena ARP request yang dikirimkan secara broadcast, sehingga semua host yang berada pada satu broadcast domain dapat merespon pesan ARP tersebut walaupun pesan tersebut bukan ditujukan untuknya. Serangan inilah yang biasa disebut dengan ARP Spoofing. Serangan ini dapat berimbas pada serangan-serangan yang lain, seperti serangan Man In The Middle Attack, Packet Sniffing, dan Distributed Denial of Service. Metode Live Forensic digunakan untuk mengidentifikasi dan mendeteksi serangan ketika sistem dalam keadaan menyala. Berdasarkan hasil penelitian yang dilakukan terbukti bahwa dengan penggunaan metode Live Forensics, investigator dapat dengan cepat mendeteksi suatu serangan dan mengidentifikasi penyerangnya.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhou, Qizhao, Junqing Yu, and Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks." Security and Communication Networks 2021 (September 21, 2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.

Full text
Abstract:
With the rapid development of data-driven and bandwidth-intensive applications in the Software Defined Networking (SDN) northbound interface, big data stream is dynamically generated with high growth rates in SDN-based data center networks. However, a significant issue faced in big data stream communication is how to verify its authenticity in an untrusted environment. The big data stream traffic has the characteristics of security sensitivity, data size randomness, and latency sensitivity, putting high strain on the SDN-based communication system during larger spoofing events in it. In addition, the SDN controller may be overloaded under big data stream verification conditions on account of the fast increase of bandwidth-intensive applications and quick response requirements. To solve these problems, we propose a two-phase adaptive authenticated model (TAAM) by introducing source address validation implementation- (SAVI-) based IP source address verification. The model realizes real-time data stream address validation and dynamically reduces the redundant verification process. A traffic adaptive SAVI that utilizes a robust localization method followed by the Sequential Probability Ratio Test (SPRT) has been proposed to ensure differentiated executions of the big data stream packets forwarding and the spoofing packets discarding. The TAAM model could filter out the unmatched packets with better packet forwarding efficiency and fundamental security characteristics. The experimental results demonstrate that spoofing attacks under big data streams can be directly mitigated by it. Compared with the latest methods, TAAM can achieve desirable network performance in terms of transmission quality, security guarantee, and response time. It drops 97% of the spoofing attack packets while consuming only 9% of the controller CPU utilization on average.
APA, Harvard, Vancouver, ISO, and other styles
46

Narayanan, Arumugam, and Venkatesh Chakrapani. "Triangular fuzzy based classification of IP request to detect spoofing request in data network." International Journal of Physical Sciences 8, no. 20 (May 30, 2013): 1074–79. http://dx.doi.org/10.5897/ijps12.639.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Shah, Zawar, and Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey." Electronics 8, no. 10 (September 28, 2019): 1095. http://dx.doi.org/10.3390/electronics8101095.

Full text
Abstract:
Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its stateless nature and lack of authentication. One such spoofing attack is the ARP Cache Poisoning attack, in which attackers poison the cache of hosts on the network by sending spoofed ARP requests and replies. Detection and mitigation of ARP Cache Poisoning attack is important as this attack can be used by attackers to further launch Denial of Service (DoS) and Man-In-The Middle (MITM) attacks. As with traditional networks, an ARP Cache Poisoning attack is also a serious concern in Software Defined Networking (SDN) and consequently, many solutions are proposed in the literature to mitigate this attack. In this paper, a detailed survey on various solutions to mitigate ARP Cache Poisoning attack in SDN is carried out. In this survey, various solutions are classified into three categories: Flow Graph based solutions; Traffic Patterns based solutions; IP-MAC Address Bindings based solutions. All these solutions are critically evaluated in terms of their working principles, advantages and shortcomings. Another important feature of this survey is to compare various solutions with respect to different performance metrics, e.g., attack detection time, ARP response time, calculation of delay at the Controller etc. In addition, future research directions are also presented in this survey that can be explored by other researchers to propose better solutions to mitigate the ARP Cache Poisoning attack in SDN.
APA, Harvard, Vancouver, ISO, and other styles
48

Velmayil, G., and S. Pannirselvam. "Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System." International Journal of Computer Network and Information Security 5, no. 5 (April 16, 2013): 47–54. http://dx.doi.org/10.5815/ijcnis.2013.05.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sharma, Vedna, and Monika Thakur. "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification." International Journal of Computer Trends and Technology 42, no. 2 (December 25, 2016): 117–23. http://dx.doi.org/10.14445/22312803/ijctt-v42p120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kovács, Márk, Péter András Agg, and Zsolt Csaba Johanyák. "SDMN Architecture in 5G." Műszaki Tudományos Közlemények 13, no. 1 (October 1, 2020): 101–4. http://dx.doi.org/10.33894/mtk-2020.13.17.

Full text
Abstract:
Abstract Due to the exponentially growing number of mobile devices connected to the Internet, the current 4G LTE-A mobile network will no longer be able to serve the nearly 5 billion mobile devices. With the advent of the fifth generation, however, the number of cybercrimes may increase. This requires building an architecture that can adequately protect against these attacks. For wired networks, the SDN-type architecture has been introduced for some time. As a result, a similar design concept has emerged, which is called Software Defined Mobile Networks (SDMN). This article describes this technology and how it helps prevents DoS, DDoS at-tacks, and IP source spoofing.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography