Literatura académica sobre el tema "IP spoofing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "IP spoofing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "IP spoofing"
Thomsen, Dan. "IP spoofing and session hijacking". Network Security 1995, n.º 3 (marzo de 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.
Texto completoAlqurashi, Reem K., Ohoud S. Al-harthi y Sabah M. Alzahrani. "Detection of IP Spoofing Attack". International Journal of Engineering Research and Technology 13, n.º 10 (31 de octubre de 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.
Texto completoFonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira y Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing". IEEE Transactions on Network and Service Management 18, n.º 3 (septiembre de 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.
Texto completoKim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement". Journal of Korean Institute of Information Technology 15, n.º 8 (31 de agosto de 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.
Texto completoVeeraraghavan, Prakash, Dalal Hanna y Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network". Electronics 9, n.º 9 (14 de septiembre de 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.
Texto completoLin, Jin Cherng, Men Jue Koo y Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection". Applied Mechanics and Materials 284-287 (enero de 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.
Texto completoKang, Jung-Ha, Yang Sun Lee, Jae Young Kim y Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing". Journal of information and communication convergence engineering 12, n.º 3 (30 de septiembre de 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.
Texto completoZhenhai Duan, Xin Yuan y J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters". IEEE Transactions on Dependable and Secure Computing 5, n.º 1 (enero de 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.
Texto completoEhrenkranz, Toby y Jun Li. "On the state of IP spoofing defense". ACM Transactions on Internet Technology 9, n.º 2 (mayo de 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.
Texto completoYao, Guang, Jun Bi y Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility". Computer Networks 57, n.º 1 (enero de 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.
Texto completoTesis sobre el tema "IP spoofing"
Ehrenkranz, Toby y Toby Ehrenkranz. "Ensuring a Valid Source and Destination for Internet Traffic". Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12445.
Texto completoIsrar, Junaid. "Design of Lightweight Alternatives to Secure Border Gateway Protocol and Mitigate against Control and Data Plane Attacks". Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22812.
Texto completoDušek, Jakub. "Penetrační testování ANC". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.
Texto completoNEIMAN, ADAM M. "HASH STAMP MARKING SCHEME FOR PACKET TRACEBACK". University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1130852252.
Texto completoMarček, Ján. "Odposlech moderních šifrovaných protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236427.
Texto completoWu, Hung-I. y 吳宏毅. "IP Spoofing Detector". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/43352837637508402538.
Texto completo國立中央大學
資訊工程研究所
95
In this project, we plan to develop a novice IP spoofing detection solution named IP Spoofing Detector (ISD) to solve this notorious security threat to computers and networks. ISD can accurately recognize whether an IP packet belongs to a TCP connection indicated in the TCP/IP header of that packet and drop all spoofed IP packets. As a result, attackers can no longer launch attacks through spoofed IP packets from the network protected by ISD. ISD will be an edge router-based solution to IP spoofing; hence, to install it there is no requirement to modify any software and hardware in any host of the protected network and there is no need to use any encryption and decryption method to authentication packets. After being installed, ISD can efficiently and effectively detect and block spoofed IP packets no matter how the layout of the protected network is changed and no matter whether mobile IPs are supported by the protected network. Since the IP spoofing problem was reported to the public by S. Bellovin of Bell Lab. in 1989, it have been used by many attackers to either conceal the attack sources (such as DoS/DDoS attacks, port scanning decoy, and IdlesScan) or forge packets as coming from hosts trusted by attacked hosts to get access to the attacked hosts (such as Man-in-the-Middle Attacks and trusted host attack). The former thwarts victims’ capability to make appropriate response to attack traffic. The later disables attacked hosts’ authentication mechanism. Both result in great damage on attacked hosts. According to FBI, in 2003, DoS/DDoS attacks alone caused about sixty-six million dollar lost in the USA. The trend of this kind of attacks continues increasing. According to TCP/IP protocol, the response of a socket to a packet changes when it is in a different state and the state of a socket changes after sending an IP packet. Based on the above principle, we can accurately confirm whether an IP packet was really sent by a specific socket. Besides, unless a 3-way handshaking is finished, a TCP connection can not be built; hence, for all packets claimed to belong to a TCP connection, ISD only needs to confirm the validity of the TCP SYN packet. The above rule can dramatically decrease the number of IP packets whose validity is needed to be verified. Based on the above analysis, we plan to develop and implement ISD on a Linux platform. The precision of the recognition of IDS could be to the socket level. Until now none of the IP spoofing detection solution could achieve such a fine precision level.
Wang, Shin-Cheng y 王信正. "A new mechanism of IP spoofing packet filtering for the 3G network". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/02065797715130115466.
Texto completo國立中興大學
資訊科學與工程學系所
100
The launch of HSDPA and HSPA services in 3G network provides users more bandwidth for uplink and downlink.This allows more network applications to be achieved.The convenience of powerful smart phones makes mobile internet access more and more popular. However, for most mobile terminals,it is not easy and effective to foil virus or hack attacks.As a result,many mobile terminals will most likely to become Corpse computers. IP spoofing has often been exploited to conceal the attack sources since one cannot clearly identify the true source of the attacker.So it is difficult to prevent attacks.In this thesis, we use the GTP (GPRS Tunnelling Protocol) protocol characteristics to design a packet filtering mechanism. It can effectively prevent the 3G mobile devices from any of network attack based on IP spoofing method. Furthermore it can identify the source of attacker correctly.
Chuang, Yu-Chun y 莊佑駿. "Design the upnp player which can play rmvb in Linux by using ip spoofing concept". Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63368891590731595069.
Texto completo國立臺灣大學
資訊工程學研究所
96
Because the contribution of UPnP and DLNA, we can build a digit home. We can access the server which is set in home by using any device supported UPnP without installing any driver. Any multimedia put on the UPnP server can be used easier by any UPnP client. Both Linux and Windows have UPnP server software, so it is very easy to set up a UPnP environment. Both operating system have UPnP client, but all the player can not play rmvb movies. For example, mpeg movies can be played through UPnP by using streaming. But no player can play rmvb movies by using UPnP. We want to design a program to play rmvb movies through UPnP. We hope the server supported multimedia can hide the server IP when send the packets to client. This uses the IP spoofing concept to change the server IP when send the streaming packets. The client thinks the packets are come from the IP we change. We can avoid the server attacking by hacker.
Capítulos de libros sobre el tema "IP spoofing"
Lagishetty, Shashank, Pruthvi Sabbu y Kannan Srinathan. "DMIPS - Defensive Mechanism against IP Spoofing". En Information Security and Privacy, 276–91. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22497-3_18.
Texto completoSingh, Vaishali y S. K. Pandey. "Revisiting Cloud Security Threats: IP Spoofing". En Advances in Intelligent Systems and Computing, 225–36. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_21.
Texto completoMoriyama, Eimatsu, Takeshi Takahashi y Daisuke Miyamoto. "DNS-Based Defense against IP Spoofing Attacks". En Neural Information Processing, 599–609. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34500-5_71.
Texto completoKováčik, Michal, Michal Kajan y Martin Žádník. "Detecting IP Spoofing by Modelling History of IP Address Entry Points". En Lecture Notes in Computer Science, 73–83. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38998-6_9.
Texto completoRavi, Mangalam, S. Narasimman, G. K. Arun Kumar y D. Karthikeyan. "A Cryptographic Approach to Defend against IP Spoofing". En Communications in Computer and Information Science, 290–96. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-12214-9_47.
Texto completoMeng, Yuxin y Lam-for Kwok. "Enhancing List-Based Packet Filter Using IP Verification Mechanism against IP Spoofing Attack in Network Intrusion Detection". En Network and System Security, 1–14. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_1.
Texto completoKim, Mihui y Kijoon Chae. "A Fast Defense Mechanism Against IP Spoofing Traffic in a NEMO Environment". En Information Networking. Convergence in Broadband and Mobile Networking, 843–52. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/978-3-540-30582-8_88.
Texto completoRamos, Manoel F., Bruno L. Dalmazo y Jeferson C. Nobre. "A Proposal for IP Spoofing Mitigation at Origin in Homenet Using Software-Defined Networking". En Computational Science and Its Applications – ICCSA 2019, 179–92. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24289-3_15.
Texto completoL., Kavisankar, Chellappan C. y Poovammal E. "Against Spoofing Attacks in Network Layer". En Advances in Digital Crime, Forensics, and Cyber Terrorism, 41–56. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0193-0.ch003.
Texto completoVerma, Karan. "IP-CHOCK Reference Detection and Prevention of Denial of Service (DoS) Attacks in Vehicular Ad-Hoc Network". En Advances in Wireless Technologies and Telecommunication, 398–420. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0773-4.ch012.
Texto completoActas de conferencias sobre el tema "IP spoofing"
Sahri, Nm y Koji Okamura. "Protecting DNS services from IP spoofing". En CFI '16: The 11th International Conference on Future Internet Technologies. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2935663.2935666.
Texto completoMukaddam, Ayman, Imad Elhajj, Ayman Kayssi y Ali Chehab. "IP Spoofing Detection Using Modified Hop Count". En 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2014. http://dx.doi.org/10.1109/aina.2014.62.
Texto completoJohn, Emil Kuriakose. "Efficient Defense System for IP Spoofing in Networks". En The Fourth International Workshop on Computer Networks & Communications. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2416.
Texto completoGonzalez, J. M., M. Anwar y J. B. D. Joshi. "A trust-based approach against IP-spoofing attacks". En 2011 Ninth Annual International Conference on Privacy, Security and Trust. IEEE, 2011. http://dx.doi.org/10.1109/pst.2011.5971965.
Texto completoFarhat, Hikmat. "A scalable method to protect from IP spoofing". En 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664411.
Texto completoMa, Yunji. "An Effective Method for Defense against IP Spoofing Attack". En 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601287.
Texto completoMopari, Indrajeet B., S. G. Pukale y M. L. Dhore. "Detection of DDoS attack and defense against IP spoofing". En the International Conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1523103.1523200.
Texto completoMavani, Monali y Krishna Asawa. "Experimental study of IP spoofing attack in 6LoWPAN network". En 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (Confluence). IEEE, 2017. http://dx.doi.org/10.1109/confluence.2017.7943192.
Texto completoSanthosh, K. R. y C. Fancy. "A dedicated setup to identify spoofing via IP-traceback". En 2017 International Conference on Intelligent Sustainable Systems (ICISS). IEEE, 2017. http://dx.doi.org/10.1109/iss1.2017.8389316.
Texto completoMopari, I. B., S. G. Pukale y M. L. Dhore. "Detection and defense against DDoS attack with IP spoofing". En 2008 International Conference on Computing, Communication and Networking (ICCCN). IEEE, 2008. http://dx.doi.org/10.1109/icccnet.2008.4787693.
Texto completoInformes sobre el tema "IP spoofing"
Ferguson, P. y D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, mayo de 2000. http://dx.doi.org/10.17487/rfc2827.
Texto completoFerguson, P. y D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. RFC Editor, enero de 1998. http://dx.doi.org/10.17487/rfc2267.
Texto completo