Abstract

In networking, the concept of IP spoofing is the process of altering Internet Protocol (IP) packets with a forged source IP address, by hiding the identity of the sender. The header of each IP packet contains the source and destination address of the packet to be sent over the network. The source address is normally the address that the packet was sent from. By changing the header, the packet will contain a different address. By this way, an attacker can show that the packet was sent by a legitimate user machine. This is how, the IP Spoofing comes into place. Cloud services is one of the method used to detect IP spoofing and it can be practical deployment of an IP trace back system there are several other techniques too. In the proposed solution, with the help of path back scatter message to detect the spoofed IP address and the attacker identity. To avoid the challenges in identifying the attacker operation and to track the origins of IP spoofing traffic is one of the vital tasks. Unless the attacker location or network identified, stopping the spoofing ip is really hard in real time scenario. By identifying the spoofer network there will be all possibilities by stopping him to do attacks like dos and ddos.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.