Sahni et al., 2017 - Google Patents
A survey of defence mechanisms against ip spoofingSahni et al., 2017
View PDF- Document ID
- 4551324275015921057
- Author
- Sahni S
- Jagtap P
- Publication year
External Links
Snippet
IP address spoofing is a serious threat to the legitimate use of the Internet. Many Preventive mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. Attackers can evade detection and put a substantial burden on the destination …
- 230000007246 mechanism 0 title abstract description 34
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ehrenkranz et al. | On the state of IP spoofing defense | |
Gu et al. | Denial of service attacks | |
Anderson et al. | Preventing Internet denial-of-service with capabilities | |
CN1968272B (en) | Method used for remitting denial of service attack in communication network and system | |
Mukaddam et al. | IP spoofing detection using modified hop count | |
Kavisankar et al. | A mitigation model for TCP SYN flooding with IP spoofing | |
Zeb et al. | DDoS attacks and countermeasures in cyberspace | |
Robinson et al. | Evaluation of mitigation methods for distributed denial of service attacks | |
Shrivastava et al. | The detection & defense of DoS & DDos attack: a technical overview | |
AT&T | 0.8-21shots.eps | |
AT&T | 0.8-21shots.eps | |
Kavisankar et al. | CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack | |
Tupakula et al. | Tracing DDoS floods: An automated approach | |
Sahni et al. | A survey of defence mechanisms against ip spoofing | |
Haitao et al. | The security issues and countermeasures in Mobile IP | |
Shue et al. | Packet forwarding with source verification | |
Noureldien et al. | Block Spoofed Packets at Source (BSPS): a method for detecting and preventing all types of spoofed source IP packets and SYN Flooding packets at source: a theoretical framework | |
Tupakula et al. | Analysis of traceback techniques | |
Mirkovic et al. | A practical IP spoofing defense through route-based filtering | |
Bhaskaran et al. | Tracebacking the spoofed IP packets in multi ISP domains with secured communication | |
Kavisankar et al. | T-RAP:(TCP reply acknowledgement packet) a resilient filtering model for DDoS attack with spoofed IP address | |
Kimiyama et al. | Autonomous and distributed internet security (AIS) infrastructure for safe internet | |
Aly et al. | Tracking and Tracing Spoofed IP Packets to Their Sources | |
Al-Qudah et al. | Internet with transient destination-controlled addressing | |
Banday et al. | A Comparative Study of Methods for Prevention and Detection of IP Address Spoofing |