A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration

Journal Title: GRD Journal for Engineering - Year 2018, Vol 3, Issue 3

Abstract

In computer networks, it consists of policies and practises adopted to prevent and monitor unauthorised access. Networks can be both public and private where many of the counter attacks were practised. It is long known that IP spoofing or IP address spoofing is one of the major threats in communication protocol. IP spoofing is nothing but IP packets with forged source IP address, with purpose of concealing the identity of sender or impersonating an another computer system by forging the source address of packet header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine .so that the IP spoofing comes into place. In existing, Passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. Though PIT cannot work in all the spoofing attacks and therefore we have proposed a novel idea, to restrict the Man in the Middle Attack (MITM) by providing inbound and outbound rules to avoid the challenges in operation. As long as the real origin of IP spoofing is not disclosed they cannot be deterred from launching further attacks. So the proposed solution ensures that the entity requesting for a service is an actual recipient by trace back the real identification of an attacker.

Authors and Affiliations

Bhuvana Natarajan, Nivetha Kuppusamy, S. Nalini

Keywords

Related Articles

Fuzzy Logic Controller based Implemented ZVT-ZCT PWM Boost Converter using Renewable Energy Source

In this study, a new boost converter with an active snubber cell is proposed. The active snubber cell provides main switch to turn on with zero voltage transition (ZVT) and to turn off with zero current transition (ZCT)....

A Concise Review on Introduction to Hydrological Models

In recent scenario of rapid urbanization and industrialization causes various changes in our natural resources like air, water, soil etc. Various problems are caused due to these changes such as drought, frequent floods,...

Design Optimization using Crowdsourcing

Crowdsourcing is the disperse problem solving model in the domain of Data mining that has emerged in recent years. Crowdsourcing is designed to relieve the user from the burden dealing with the crowd. The Motivation of t...

Foreground-Background Separation From Video Clips Using RMAMR Method Along With Ground Truth Extraction

Foreground-Background Separation from video clips using RMAMR method along with ground truth extraction plays a great role in video surveillance systems. The method proves to be a fully and important technique, making re...

Isolated Switched Boost Push Pull DC-DC Step-Up Converter

An isolated switched high step up boost DC-DC converter is discussed in this paper. The main objective of this paper is to step up low voltage to very high voltage. This paper mainly initiates at boosting a 30V DC into 2...

Download PDF file
  • EP ID EP291542
  • DOI -
  • Views 177
  • Downloads 0

How To Cite

Bhuvana Natarajan, Nivetha Kuppusamy, S. Nalini (2018). A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration. GRD Journal for Engineering, 3(3), 40-43. https://europub.co.uk/articles/-A-291542