Siga este enlace para ver otros tipos de publicaciones sobre el tema: IP spoofing.

Artículos de revistas sobre el tema "IP spoofing"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "IP spoofing".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Thomsen, Dan. "IP spoofing and session hijacking". Network Security 1995, n.º 3 (marzo de 1995): 6–11. http://dx.doi.org/10.1016/s1353-4858(00)80045-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Alqurashi, Reem K., Ohoud S. Al-harthi y Sabah M. Alzahrani. "Detection of IP Spoofing Attack". International Journal of Engineering Research and Technology 13, n.º 10 (31 de octubre de 2020): 2736. http://dx.doi.org/10.37624/ijert/13.10.2020.2736-2741.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Fonseca, Osvaldo, Italo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira y Ethan Katz-Bassett. "Identifying Networks Vulnerable to IP Spoofing". IEEE Transactions on Network and Service Management 18, n.º 3 (septiembre de 2021): 3170–83. http://dx.doi.org/10.1109/tnsm.2021.3061486.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Kim, Jin. "IP Spoofing Detection Technique for Endpoint Security Enhancement". Journal of Korean Institute of Information Technology 15, n.º 8 (31 de agosto de 2017): 75–83. http://dx.doi.org/10.14801/jkiit.2017.15.8.75.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Veeraraghavan, Prakash, Dalal Hanna y Eric Pardede. "NAT++: An Efficient Micro-NAT Architecture for Solving IP-Spoofing Attacks in a Corporate Network". Electronics 9, n.º 9 (14 de septiembre de 2020): 1510. http://dx.doi.org/10.3390/electronics9091510.

Texto completo
Resumen
The Internet Protocol (IP) version 4 (IPv4) has several known vulnerabilities. One of the important vulnerabilities is that the protocol does not validate the correctness of the source address carried in an IP packet. Users with malicious intentions may take advantage of this vulnerability and launch various attacks against a target host or a network. These attacks are popularly known as IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is the DNS-amplification attack. Currently, the availability of solutions is limited, proprietary, expensive, and requires expertise. The Internet is subjected to several other forms of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since 2005, there is no holistic solution available to solve this problem from the gross-root. Also, every solution assumes that the attackers are always from outside networks. In this paper, we provide an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside hosts. We use a modified form of Network Address Translation (NAT) to build our solution framework. We call our framework as NAT++. The proposed infrastructure is robust, crypto-free, and easy to implement. Our simulation results have shown that the proposed NAT++ infrastructure does not consume more than the resources required by a simple NAT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Lin, Jin Cherng, Men Jue Koo y Cheng Sheng Wang. "A Proposal for a Schema for ARP Spoofing Protection". Applied Mechanics and Materials 284-287 (enero de 2013): 3275–79. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3275.

Texto completo
Resumen
IP scheme over Ethernet is one of the world's most widely used network structure. However, ARP Spoofing attacks still remain as one of serious security threats on the local area network. Despite the seriousness, there is no protective mechanism that can effectively protect against ARP Spoofing attacks available yet. This paper proposes an ARP query process mechanism that corresponds with the current IP/MAC mapping correlations based upon the existing ARP protocol and the "Direct Communication" characteristic of the LAN. It can effectively protect against ARP Spoofing attacks without change of network structures or an increase of investments in personnel and equipments.
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Kang, Jung-Ha, Yang Sun Lee, Jae Young Kim y Eun-Gi Kim. "ARP Modification for Prevention of IP Spoofing". Journal of information and communication convergence engineering 12, n.º 3 (30 de septiembre de 2014): 154–60. http://dx.doi.org/10.6109/jicce.2014.12.3.154.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Zhenhai Duan, Xin Yuan y J. Chandrashekar. "Controlling IP Spoofing through Interdomain Packet Filters". IEEE Transactions on Dependable and Secure Computing 5, n.º 1 (enero de 2008): 22–36. http://dx.doi.org/10.1109/tdsc.2007.70224.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Ehrenkranz, Toby y Jun Li. "On the state of IP spoofing defense". ACM Transactions on Internet Technology 9, n.º 2 (mayo de 2009): 1–29. http://dx.doi.org/10.1145/1516539.1516541.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Yao, Guang, Jun Bi y Peiyao Xiao. "VASE: Filtering IP spoofing traffic with agility". Computer Networks 57, n.º 1 (enero de 2013): 243–57. http://dx.doi.org/10.1016/j.comnet.2012.08.018.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Vlajic, Natalija, Mashruf Chowdhury y Marin Litoiu. "IP Spoofing In and Out of the Public Cloud: From Policy to Practice". Computers 8, n.º 4 (9 de noviembre de 2019): 81. http://dx.doi.org/10.3390/computers8040081.

Texto completo
Resumen
In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the increased tightening of regulations and controls against IP spoofing by world-wide Internet service providers (ISPs). Three main contributions of this paper are (1) For the first time in the research literature, we provide a comprehensive look at a number of possible attacks that involve the transmission of spoofed packets from or towards the virtual private servers hosted by a public Cloud provider. (2) We summarize the key findings of our research on the regulation of IP spoofing in the acceptable-use and term-of-service policies of 35 real-world Cloud providers. The findings reveal that in over 50% of cases, these policies make no explicit mention or prohibition of IP spoofing, thus failing to serve as a potential deterrent. (3) Finally, we describe the results of our experimental study on the actual practical feasibility of IP spoofing involving a select number of real-world Cloud providers. These results show that most of the tested public Cloud providers do a very good job of preventing (potential) hackers from using their virtual private servers to launch spoofed-IP campaigns on third-party targets. However, the same very own virtual private servers of these Cloud providers appear themselves vulnerable to a number of attacks that involve the use of spoofed IP packets and/or could be deployed as packet-reflectors in attacks on third party targets. We hope the paper serves as a call for awareness and action and motivates the public Cloud providers to deploy better techniques for detection and elimination of spoofed IP traffic.
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Raju, Dr K. Butchi. "A Novel IP Traceback Scheme for Spoofing Attack". International Journal of Advanced engineering, Management and Science 3, n.º 2 (2017): 1–6. http://dx.doi.org/10.24001/ijaems.3.2.1.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Sahni, Sarita y Pankaj Jagtap. "A Survey of Defence Mechanisms against IP Spoofing". IARJSET 4, n.º 7 (20 de julio de 2017): 20–27. http://dx.doi.org/10.17148/iarjset.2017.4704.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Benson Edwin Raj, S., V. S. Jayanthi y R. Shalini. "A Novel Approach for the Early Detection and Identification of Botnets". Advanced Materials Research 403-408 (noviembre de 2011): 4469–75. http://dx.doi.org/10.4028/www.scientific.net/amr.403-408.4469.

Texto completo
Resumen
Botnets are growing in size, number and impact. It continues to be one of the top three web threats that mankind has ever known. The botnets are the souped-up cyber engines driving nearly all criminal commerce on the Internet and are seen as relaying millions of pieces of junk e-mail, or spam. Thus, the need of the hour is the early detection and identification of the heart of network packet flooding or the C&C centre. Most of the botmasters perform DDos attacks on a target server by spoofing the source IP address. The existing botnet detection techniques rely on machine learning algorithms and do not expound the IP spoofing issue. These approaches are also found to be unsuccessful in the meticulous identification of the botmasters. Here we propose an architecture that depend on the PSO-based IP tracebacking. Our architecture also introduces the IP spoofing detector unit so as to ensure that the Traceback moves in the right direction. The approach also detects the zombies and utilizes the PSO optimization technique that aid in the identification of the C&C node. The experimental results show that our approach is successful in prompt detection of the bots.
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Park, Sun-Hee, Dong-Il Yang, Kwang-Youn Jin y Hyung-Jin Choi. "A Modeling of Forensics for Mobile IP Spoofing Prevention". Journal of Korea Navigation Institute 16, n.º 2 (30 de abril de 2012): 307–17. http://dx.doi.org/10.12673/jkoni.2012.16.2.307.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Sudi Lema, Hussein. "Preventing IP Spoofing Attacks in a Shared Resources Network". International Journal of Cyber-Security and Digital Forensics 8, n.º 2 (2019): 144–51. http://dx.doi.org/10.17781/p002575.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Sudhakaran, Pradeep. "Detection of Spoofing Attacks on SDN through IP Trace Back Protocol". Journal of Advanced Research in Dynamical and Control Systems 12, SP4 (31 de marzo de 2020): 55–61. http://dx.doi.org/10.5373/jardcs/v12sp4/20201466.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Shariff, Vahiduddin, Ruth Ramya K, B. Renuka Devi, Debnath Bhattacharyya y Tai-hoon Kim. "A survey on existing IP trace back mechanisms and their comparisons". International Journal of Engineering & Technology 7, n.º 1.9 (1 de marzo de 2018): 67. http://dx.doi.org/10.14419/ijet.v7i1.9.9972.

Texto completo
Resumen
Security is the one of the main point of focus in recent trends of computer science, as it has to determine the right people accessing the system and ones who are trying the bypassing it. IP spoofing is one of the prevalent attacks, where the attackers launch the attack by spoofing the source address, once this happens they can attack without revealing their exact location. The attacker uses a fraudulent IP address to conceal their identity. To reveal the attackers real locations many IP trace back mechanisms have been proposed but the attacker immediately gets away with the information. There is another problem which is to detect DDoS traffic and the precarious packets set up by the attacker, which are a threat to the victim as well as the whole network, here lies another hurdle which is to differentiate between the attacker’s data traffic from the normal data traffic. There are many solutions given for this but one among them is IP trace back which already has researched upon in the past and implemented then, but what is lacking in the solution such that the attacks are even now taking place. IP trace back if modified, strengthened would analyze the traffic faster and trace out the attacker with a faster pace, which is why a hybrid IP tracing and tracking mechanism if introduced could ease the current problem.
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Basim, Huda y Turkan Ahmed. "An Improved Strategy for Detection and Prevention IP Spoofing Attack". International Journal of Computer Applications 182, n.º 9 (14 de agosto de 2018): 28–31. http://dx.doi.org/10.5120/ijca2018917667.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Kang, Dong W., Joo H. Oh, Chae T. Im, Wan S. Yi y Yoo J. Won. "A Practical Attack on Mobile Data Network Using IP Spoofing". Applied Mathematics & Information Sciences 7, n.º 6 (1 de noviembre de 2013): 2345–53. http://dx.doi.org/10.12785/amis/070626.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Mavani, Monali y Krishna Asawa. "Modeling and analyses of IP spoofing attack in 6LoWPAN network". Computers & Security 70 (septiembre de 2017): 95–110. http://dx.doi.org/10.1016/j.cose.2017.05.004.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Seo, Jung-Woo y Sang-Jin Lee. "A study on the detection of DDoS attack using the IP Spoofing". Journal of the Korea Institute of Information Security and Cryptology 25, n.º 1 (28 de febrero de 2015): 147–53. http://dx.doi.org/10.13089/jkiisc.2015.25.1.147.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

KIM, Tae Hwan, Dong Seong KIM y Hee Young JUNG. "Defending against DDoS Attacks under IP Spoofing Using Image Processing Approach". IEICE Transactions on Communications E99.B, n.º 7 (2016): 1511–22. http://dx.doi.org/10.1587/transcom.2015ebp3457.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Srinath, D., J. Janet y Jose Anand. "A Survey of Routing Instability with IP Spoofing on the Internet". Asian Journal of Information Technology 9, n.º 3 (1 de marzo de 2010): 154–58. http://dx.doi.org/10.3923/ajit.2010.154.158.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Zhang, Chaoqin, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Ping'an Zhang, Xia Yan y Weijin Jiang. "Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack". IEEE Access 6 (2018): 22764–77. http://dx.doi.org/10.1109/access.2017.2785236.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

KIM, M. "Proactive Defense Mechanism against IP Spoofing Traffic on a NEMO Environment". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, n.º 7 (1 de julio de 2006): 1959–67. http://dx.doi.org/10.1093/ietfec/e89-a.7.1959.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Lu, XiCheng, GaoFeng Lü, PeiDong Zhu y YiJiao Chen. "MASK: An efficient mechanism to extend inter-domain IP spoofing preventions". Science in China Series F: Information Sciences 51, n.º 11 (16 de octubre de 2008): 1745–60. http://dx.doi.org/10.1007/s11432-008-0144-8.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Narendhiran R, Pavithra K, Rakshana P, Sangeetha P. "Software Defined Based Pure VPN Protocol for Preventing IP Spoofing Attacks in IOT". International Journal on Recent and Innovation Trends in Computing and Communication 7, n.º 3 (20 de marzo de 2019): 14–20. http://dx.doi.org/10.17762/ijritcc.v7i3.5251.

Texto completo
Resumen
The Internet of things (IoT) is the network of devices, vehicles, and home appliances that contain electronics, software, actuators, and connectivity which allows these things to connect, interact and exchange data. IoT involves extending Internet connectivity beyond standard devices, such as desktops, laptops, smart phones and tablets, to any range of traditionally dumb or non-internet-enabled physical devices and everyday objects. Embedded with technology, these devices can communicate and interact over the Internet, and they can be remotely monitored and controlled. Traditionally, current internet packet delivery only depends on packet destination IP address and forward devices neglect the validation of packet’s IP source address. It makes attacks can leverage this flow to launch attacks with forge IP source address so as to meet their violent purpose and avoid to be tracked. In order to reduce this threat and enhance internet accountability, many solution proposed in the inter domain and intra domain aspects. Furthermore, most of them faced with some issues hard to cope, i.e., data security, data privacy. And most importantly code cover PureVPN protocol for both inter and intra domain areas. The novel network architecture of SDN possess whole network PureVPN protocol rule instead of traditional SDN switches, which brings good opportunity to solve IP spoofing problems. However, use authentication based on key exchange between the machines on your network; something like IP Security protocol will significantly cut down on the risk of spoofing. This paper proposes a SDN based PureVPN protocol architecture, which can cover both inter and intra domain areas with encrypted format effectively than SDN devices. The PureVPN protocol scheme is significant in improving the security and privacy in SDN for IoT.
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Arumugam, Dr N. "A Survey of Network-Based Detection and Defense Mechanisms Countering the IP Spoofing Problems". International Journal of Trend in Scientific Research and Development Volume-2, Issue-5 (31 de agosto de 2018): 704–10. http://dx.doi.org/10.31142/ijtsrd15921.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
30

Bhavani, Y., V. Janaki y R. Sridevi. "Survey on Packet Marking Algorithms for IP Traceback". Oriental journal of computer science and technology 10, n.º 2 (6 de junio de 2017): 507–12. http://dx.doi.org/10.13005/ojcst/10.02.36.

Texto completo
Resumen
Distributed Denial of Service (DDoS) attack is an unavoidable attack. Among various attacks on the network, DDoS attacks are difficult to detect because of IP spoofing. The IP traceback is the only technique to identify DDoS attacks. The path affected by DDoS attack is identified by IP traceback approaches like Probabilistic Packet marking algorithm (PPM) and Deterministic Packet Marking algorithm (DPM). The PPM approach finds the complete attack path from victim to the source where as DPM finds only the source of the attacker. Using DPM algorithm finding the source of the attacker is difficult, if the router get compromised. Using PPM algorithm we construct the complete attack path, so the compromised router can be identified. In this paper, we review PPM and DPM techniques and compare the strengths and weaknesses of each proposal.
Los estilos APA, Harvard, Vancouver, ISO, etc.
31

Bi, Jun, Bingyang Liu, Jianping Wu y Yan Shen. "Preventing IP source address spoofing: A two-level, state machine-based method". Tsinghua Science and Technology 14, n.º 4 (agosto de 2009): 413–22. http://dx.doi.org/10.1016/s1007-0214(09)70097-5.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
32

Bharti, Abhishek. "Detection of Session Hijacking and IP Spoofing Using Sensor Nodes and Cryptography". IOSR Journal of Computer Engineering 13, n.º 2 (2013): 66–73. http://dx.doi.org/10.9790/0661-1326673.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
33

Murugan, K. y P. Varalakshmi. "IP Spoofing Attack Mitigation using Extreme Learning Machine to Promote Secure Data Transmission". Asian Journal of Research in Social Sciences and Humanities 6, n.º 6 (2016): 394. http://dx.doi.org/10.5958/2249-7315.2016.00217.3.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
34

Arumugam, N. "A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm". IOSR Journal of Engineering 02, n.º 10 (octubre de 2012): 09–16. http://dx.doi.org/10.9790/3021-021020916.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
35

Yaar, A., A. Perrig y D. Song. "StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense". IEEE Journal on Selected Areas in Communications 24, n.º 10 (octubre de 2006): 1853–63. http://dx.doi.org/10.1109/jsac.2006.877138.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
36

Velmayil, G. y S. Pannirselvam. "Detection and Removal of IP Spoofing through Extended-Inter Domain Packet Filter Architecture". International Journal of Computer Applications 49, n.º 17 (28 de julio de 2012): 37–43. http://dx.doi.org/10.5120/7723-1126.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
37

Lopes, Paulo, Paulo Salvador y António Nogueira. "Methodologies for Network Topology Discovery and Detection of MAC and IP Spoofing Attacks". Network Protocols and Algorithms 5, n.º 3 (31 de octubre de 2013): 153. http://dx.doi.org/10.5296/npa.v5i3.4316.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
38

Lee, Hae-Dong, Hyeon-Tae Ha, Hyun-Chul Baek, Chang-Gun Kim y Sang-Bok Kim. "Efficient Detction and Defence Model against IP Spoofing Attack through Cooperation of Trusted Hosts". Journal of the Korean Institute of Information and Communication Engineering 16, n.º 12 (31 de diciembre de 2012): 2649–56. http://dx.doi.org/10.6109/jkiice.2012.16.12.2649.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
39

Yang, Ming Hour. "Hybrid Single-Packet IP Traceback with Low Storage and High Accuracy". Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/239280.

Texto completo
Resumen
Traceback schemes have been proposed to trace the sources of attacks that usually hide by spoofing their IP addresses. Among these methods, schemes using packet logging can achieve single-packet traceback. But packet logging demands high storage on routers and therefore makes IP traceback impractical. For lower storage requirement, packet logging and packet marking are fused to make hybrid single-packet IP traceback. Despite such attempts, their storage still increases with packet numbers. That is why RIHT bounds its storage with path numbers to guarantee low storage. RIHT uses IP header’s ID and offset fields to mark packets, so it inevitably suffers from fragment and drop issues for its packet reassembly. Although the 16-bit hybrid IP traceback schemes, for example, MORE, can mitigate the fragment problem, their storage requirement grows up with packet numbers. To solve the storage and fragment problems in one shot, we propose a single-packet IP traceback scheme that only uses packets’ ID field for marking. Our major contributions are as follows: (1) our fragmented packets with tracing marks can be reassembled; (2) our storage is not affected by packet numbers; (3) it is the first hybrid single-packet IP traceback scheme to achieve zero false positive and zero false negative rates.
Los estilos APA, Harvard, Vancouver, ISO, etc.
40

Rahman, Md Mustafejur, Md Mustafizur Rahman, Saif Ibne Reza, Sumonto Sarker y Md Mehedi Islam. "Proposed an Algorithm for Preventing IP Spoofing DoS Attack on Neighbor Discovery Protocol of IPv6 in Link Local Network". European Journal of Engineering Research and Science 4, n.º 12 (17 de diciembre de 2019): 65–70. http://dx.doi.org/10.24018/ejers.2019.4.12.1644.

Texto completo
Resumen
Duplicate Address Detection (DAD) is one of the most interesting features in IPv6. It allows nodes to connect to a network by generating a unique IP address. It works on two Neighbor Discovery (ND) messages, namely, Neighbor Solicitation (NS) and Neighbor Advertisement (NA). To verify the uniqueness of generating IP, it sends that IP address via NS message to existing hosts. Any malicious node can receive NS message and can send a spoof reply, thereby initiates a DoS attack and prevents auto configuration process. In this manner, DAD is vulnerable to such DoS attack. This study aims to prevent those malicious nodes from sending spoof reply by securing both NS and NA messages. The proposed Advanced Bits Security (ABS) technique is based on Blake2 algorithm and introducing a creative option called ABS field that holds the hash value of tentative IP address and attached to both NA and NS message. We expect the ABS technique can prevent spoof reply during DAD procedure in link local network and can prevent DoS attack
Los estilos APA, Harvard, Vancouver, ISO, etc.
41

Yang, Ru. "Study on ARP Protocol and Network Security in Digital Manufacturing". Applied Mechanics and Materials 484-485 (enero de 2014): 191–95. http://dx.doi.org/10.4028/www.scientific.net/amm.484-485.191.

Texto completo
Resumen
Network spoofing attacks are very specialized attacks, and network security managers brought a severe test. In this paper, through the analysis of the ARP protocol works, it discusses ARP protocol ARP virus are two common attacks from the IP address to the security risks that exist in the physical address resolution process, and then analyzes in detail, and then introduces the ARP Find virus source and virus removal methods, and finally putting forward effective measures to guard against ARP virus.
Los estilos APA, Harvard, Vancouver, ISO, etc.
42

Song, Min Su, Jae Dong Lee, Young-Sik Jeong, Hwa-Young Jeong y Jong Hyuk Park. "DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments". Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/264654.

Texto completo
Resumen
Despite the convenience, ubiquitous computing suffers from many threats and security risks. Security considerations in the ubiquitous network are required to create enriched and more secure ubiquitous environments. The address resolution protocol (ARP) is a protocol used to identify the IP address and the physical address of the associated network card. ARP is designed to work without problems in general environments. However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. In this paper, we propose a new detection scheme for ARP spoofing attacks using a routing trace, which can be used to protect the internal network. Tracing routing can find the change of network movement path. The proposed scheme provides high constancy and compatibility because it does not alter the ARP protocol. In addition, it is simple and stable, as it does not use a complex algorithm or impose extra load on the computer system.
Los estilos APA, Harvard, Vancouver, ISO, etc.
43

Li, Pengkun, Jinshu Su, Xiaofeng Wang y Qianqian Xing. "DIIA: Blockchain-Based Decentralized Infrastructure for Internet Accountability". Security and Communication Networks 2021 (19 de julio de 2021): 1–17. http://dx.doi.org/10.1155/2021/1974493.

Texto completo
Resumen
The Internet lacking accountability suffers from IP address spoofing, prefix hijacking, and DDoS attacks. Global PKI-based accountable network involves harmful centralized authority abuse and complex certificate management. The inherently accountable network with self-certifying addresses is incompatible with the current Internet and faces the difficulty of revoking and updating keys. This study presents DIIA, a blockchain-based decentralized infrastructure to provide accountability for the current Internet. Specifically, DIIA designs a public-permissioned blockchain called TIPchain to act as a decentralized trust anchor, allowing cryptographic authentication of IP addresses without any global trusted authority. DIIA also proposes the revocable trustworthy IP address bound to the cryptographic key, which supports automatic key renewal and efficient key revocation and eliminates complexity certificate management. We present several security mechanisms based on DIIA to show how DIIA can help to enhance network layer security. We also implement a prototype system and experiment with real-world data. The results demonstrate the feasibility and suitability of our work in practice.
Los estilos APA, Harvard, Vancouver, ISO, etc.
44

Hafizh, M. Nasir, Imam Riadi y Abdul Fadlil. "Forensik Jaringan Terhadap Serangan ARP Spoofing menggunakan Metode Live Forensic". Jurnal Telekomunikasi dan Komputer 10, n.º 2 (21 de agosto de 2020): 111. http://dx.doi.org/10.22441/incomtech.v10i2.8757.

Texto completo
Resumen
Pada jaringan komputer, protokol yang bertugas untuk untuk menerjemahkan IP address menjadi MAC Address adalah Address Resolution Protocol (ARP). Sifat stateless pada protokol ARP, menyebabkan protokol ARP memiliki celah dari segi keamanan. Celah ini dapat menimbulkan serangan terhadap ARP Protocol, disebabkan karena ARP request yang dikirimkan secara broadcast, sehingga semua host yang berada pada satu broadcast domain dapat merespon pesan ARP tersebut walaupun pesan tersebut bukan ditujukan untuknya. Serangan inilah yang biasa disebut dengan ARP Spoofing. Serangan ini dapat berimbas pada serangan-serangan yang lain, seperti serangan Man In The Middle Attack, Packet Sniffing, dan Distributed Denial of Service. Metode Live Forensic digunakan untuk mengidentifikasi dan mendeteksi serangan ketika sistem dalam keadaan menyala. Berdasarkan hasil penelitian yang dilakukan terbukti bahwa dengan penggunaan metode Live Forensics, investigator dapat dengan cepat mendeteksi suatu serangan dan mengidentifikasi penyerangnya.
Los estilos APA, Harvard, Vancouver, ISO, etc.
45

Zhou, Qizhao, Junqing Yu y Dong Li. "An Adaptive Authenticated Model for Big Data Stream SAVI in SDN-Based Data Center Networks". Security and Communication Networks 2021 (21 de septiembre de 2021): 1–14. http://dx.doi.org/10.1155/2021/5451820.

Texto completo
Resumen
With the rapid development of data-driven and bandwidth-intensive applications in the Software Defined Networking (SDN) northbound interface, big data stream is dynamically generated with high growth rates in SDN-based data center networks. However, a significant issue faced in big data stream communication is how to verify its authenticity in an untrusted environment. The big data stream traffic has the characteristics of security sensitivity, data size randomness, and latency sensitivity, putting high strain on the SDN-based communication system during larger spoofing events in it. In addition, the SDN controller may be overloaded under big data stream verification conditions on account of the fast increase of bandwidth-intensive applications and quick response requirements. To solve these problems, we propose a two-phase adaptive authenticated model (TAAM) by introducing source address validation implementation- (SAVI-) based IP source address verification. The model realizes real-time data stream address validation and dynamically reduces the redundant verification process. A traffic adaptive SAVI that utilizes a robust localization method followed by the Sequential Probability Ratio Test (SPRT) has been proposed to ensure differentiated executions of the big data stream packets forwarding and the spoofing packets discarding. The TAAM model could filter out the unmatched packets with better packet forwarding efficiency and fundamental security characteristics. The experimental results demonstrate that spoofing attacks under big data streams can be directly mitigated by it. Compared with the latest methods, TAAM can achieve desirable network performance in terms of transmission quality, security guarantee, and response time. It drops 97% of the spoofing attack packets while consuming only 9% of the controller CPU utilization on average.
Los estilos APA, Harvard, Vancouver, ISO, etc.
46

Narayanan, Arumugam y Venkatesh Chakrapani. "Triangular fuzzy based classification of IP request to detect spoofing request in data network". International Journal of Physical Sciences 8, n.º 20 (30 de mayo de 2013): 1074–79. http://dx.doi.org/10.5897/ijps12.639.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
47

Shah, Zawar y Steve Cosgrove. "Mitigating ARP Cache Poisoning Attack in Software-Defined Networking (SDN): A Survey". Electronics 8, n.º 10 (28 de septiembre de 2019): 1095. http://dx.doi.org/10.3390/electronics8101095.

Texto completo
Resumen
Address Resolution Protocol (ARP) is a widely used protocol that provides a mapping of Internet Protocol (IP) addresses to Media Access Control (MAC) addresses in local area networks. This protocol suffers from many spoofing attacks because of its stateless nature and lack of authentication. One such spoofing attack is the ARP Cache Poisoning attack, in which attackers poison the cache of hosts on the network by sending spoofed ARP requests and replies. Detection and mitigation of ARP Cache Poisoning attack is important as this attack can be used by attackers to further launch Denial of Service (DoS) and Man-In-The Middle (MITM) attacks. As with traditional networks, an ARP Cache Poisoning attack is also a serious concern in Software Defined Networking (SDN) and consequently, many solutions are proposed in the literature to mitigate this attack. In this paper, a detailed survey on various solutions to mitigate ARP Cache Poisoning attack in SDN is carried out. In this survey, various solutions are classified into three categories: Flow Graph based solutions; Traffic Patterns based solutions; IP-MAC Address Bindings based solutions. All these solutions are critically evaluated in terms of their working principles, advantages and shortcomings. Another important feature of this survey is to compare various solutions with respect to different performance metrics, e.g., attack detection time, ARP response time, calculation of delay at the Controller etc. In addition, future research directions are also presented in this survey that can be explored by other researchers to propose better solutions to mitigate the ARP Cache Poisoning attack in SDN.
Los estilos APA, Harvard, Vancouver, ISO, etc.
48

Velmayil, G. y S. Pannirselvam. "Defending of IP Spoofing by Ingress Filter in Extended-Inter Domain Packet Key Marking System". International Journal of Computer Network and Information Security 5, n.º 5 (16 de abril de 2013): 47–54. http://dx.doi.org/10.5815/ijcnis.2013.05.06.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
49

Sharma, Vedna y Monika Thakur. "Analyse and Detect the IP Spoofing Attack in Web Log Files Using BPNN for Classification". International Journal of Computer Trends and Technology 42, n.º 2 (25 de diciembre de 2016): 117–23. http://dx.doi.org/10.14445/22312803/ijctt-v42p120.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
50

Kovács, Márk, Péter András Agg y Zsolt Csaba Johanyák. "SDMN Architecture in 5G". Műszaki Tudományos Közlemények 13, n.º 1 (1 de octubre de 2020): 101–4. http://dx.doi.org/10.33894/mtk-2020.13.17.

Texto completo
Resumen
Abstract Due to the exponentially growing number of mobile devices connected to the Internet, the current 4G LTE-A mobile network will no longer be able to serve the nearly 5 billion mobile devices. With the advent of the fifth generation, however, the number of cybercrimes may increase. This requires building an architecture that can adequately protect against these attacks. For wired networks, the SDN-type architecture has been introduced for some time. As a result, a similar design concept has emerged, which is called Software Defined Mobile Networks (SDMN). This article describes this technology and how it helps prevents DoS, DDoS at-tacks, and IP source spoofing.
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!

Pasar a la bibliografía