[go: up one dir, main page]

Sahni et al., 2017 - Google Patents

A survey of defence mechanisms against ip spoofing

Sahni et al., 2017

View PDF
Document ID
4551324275015921057
Author
Sahni S
Jagtap P
Publication year

External Links

Snippet

IP address spoofing is a serious threat to the legitimate use of the Internet. Many Preventive mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. Attackers can evade detection and put a substantial burden on the destination …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
Ehrenkranz et al. On the state of IP spoofing defense
Gu et al. Denial of service attacks
Anderson et al. Preventing Internet denial-of-service with capabilities
CN1968272B (en) Method used for remitting denial of service attack in communication network and system
Mukaddam et al. IP spoofing detection using modified hop count
Kavisankar et al. A mitigation model for TCP SYN flooding with IP spoofing
Zeb et al. DDoS attacks and countermeasures in cyberspace
Robinson et al. Evaluation of mitigation methods for distributed denial of service attacks
Shrivastava et al. The detection & defense of DoS & DDos attack: a technical overview
AT&T 0.8-21shots.eps
AT&T 0.8-21shots.eps
Kavisankar et al. CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack
Tupakula et al. Tracing DDoS floods: An automated approach
Sahni et al. A survey of defence mechanisms against ip spoofing
Haitao et al. The security issues and countermeasures in Mobile IP
Shue et al. Packet forwarding with source verification
Noureldien et al. Block Spoofed Packets at Source (BSPS): a method for detecting and preventing all types of spoofed source IP packets and SYN Flooding packets at source: a theoretical framework
Tupakula et al. Analysis of traceback techniques
Mirkovic et al. A practical IP spoofing defense through route-based filtering
Bhaskaran et al. Tracebacking the spoofed IP packets in multi ISP domains with secured communication
Kavisankar et al. T-RAP:(TCP reply acknowledgement packet) a resilient filtering model for DDoS attack with spoofed IP address
Kimiyama et al. Autonomous and distributed internet security (AIS) infrastructure for safe internet
Aly et al. Tracking and Tracing Spoofed IP Packets to Their Sources
Al-Qudah et al. Internet with transient destination-controlled addressing
Banday et al. A Comparative Study of Methods for Prevention and Detection of IP Address Spoofing