Proposed Methods of IP Spoofing Detection & Prevention

Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 8

Abstract

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ?New form of attack on computers linked to Internet is uncovered, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This paper is on ?

Authors and Affiliations

Keywords

Related Articles

Enhancement in Nunit Testing Framework by binding Logging with Unit testing

Enhancement in Nunit Testing Framework by binding Logging with Unit testing

Automatic Distribution of Documents into Different Categories using Active Learning

Automatic Distribution of Documents into Different Categories using Active Learning

A Rare Cause of Chronic Cough: Tracheobronchopathia Osteochondroplastica

"Tracheobronchopathia osteochondroplastica (TO) is a rare disease of unknown etiology and only sporadic cases have been reported in the literature. This disease may be presented with a nonspesific symptom such as persist...

Comparative Study of MAC Algorithms in Pervasive Computing Environment

Nowadays coming technology, many applications dependupon the existence of small devices that can exchange, share the information and formcommunication networks. In an expressive manner of such applications, the confident...

Security on Cloud Computing: A Review

Cloud is a modern age computing paradigmwhich has potential to bring great benefits to information and Communication Technology ICT enabled business. The term Cloud comes from the graphic that was often used to show the...

Download PDF file
  • EP ID EP337526
  • DOI -
  • Views 50
  • Downloads 0

How To Cite

(2013). Proposed Methods of IP Spoofing Detection & Prevention. International Journal of Science and Research (IJSR), 2(8), -. https://europub.co.uk/articles/-A-337526