Limpar
750 resultados

Acesso aberto

Tipo do recurso

Ano de criação

Produção nacional

Revisado por pares

Áreas

Idioma

Editores

Artigo Revisado por pares

Neminath Hubballi, Santosh Biswas, S. Roopa, Ritesh Ratti, Sukumar Nandi,

... hosts in a Local Area Network (LAN) by spoofing IP-MAC pairs. Several schemes have been proposed in ... as genuine/spoofed by the detector. Also, spoofed IP-MAC pairs determined by the detector are stored in tables to detect other LAN attacks triggered by spoofing namely, man-in-the-middle (MiTM), denial of ...

Tópico(s): Security in Wireless Sensor Networks

2010 - Elsevier BV | ISA Transactions

Artigo

Debashis Basak, Rohit Toshniwal, Serge Maskalik, Allwyn Sequeira,

... VMs implies they can perform checks for MAC spoofing, IP spoofing [6], ARP filtering at the source. Furthermore, based ...

Tópico(s): Caching and Content Delivery

2010 - Association for Computing Machinery | ACM SIGOPS Operating Systems Review

Artigo Revisado por pares

Jonghoon Kwon, Dong-Won Seo, Minjin Kwon, Heejo Lee, Adrian Perrig, Hyogon Kim,

Internet attacks often use IP spoofing to forge the source IP address of packets, and thereby hide the identity of the source. It causes many serious ... of packet authenticity and IP traceback. While many IP spoofing prevention techniques have been proposed apart from ingress ... a model of Internet connectivity, BASE shows desirable IP spoofing prevention capabilities under partial deployment. We find that ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2015 - Elsevier BV | Computer Communications

Artigo Revisado por pares

Ming‐Hour Yang, Ming-Chien Yang,

... s attention. However, adversaries often hide themselves by spoofing their own IP addresses and then launch attacks. For this reason, ...

Tópico(s): Network Packet Processing and Optimization

2012 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Acesso aberto Revisado por pares

Ming‐Hour Yang, Jia-Ning Luo, M. Vijayalakshmi, S. Mercy Shalinie,

... Attackers can conceal their actual attack locations by spoofing IP addresses to attack IoT devices, law enforcement cannot ...

Tópico(s): Advanced Malware Detection Techniques

2020 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto Revisado por pares

Esra SÖĞÜT, O. Ayhan Erdem,

... various DDoS attacks, i.e., TCP, UDP, SYN, spoofing IP, and ICMP Flooding. Additionally, we evaluated a scenario ...

Tópico(s): Smart Grid Security and Resilience

2023 - Multidisciplinary Digital Publishing Institute | Applied Sciences

Artigo Acesso aberto Revisado por pares

Md Hasan, Yanxiao Zhao, Yu Luo, Guodong Wang, Robb M. Winter,

... considering both with and without Internet Protocol (IP) spoofing. If no IP spoofing exists, we modify the route request forwarding procedure ... can prevent flooding attacks when there is no IP spoofing from flooding attacker. If IP spoofing exists, the flooding attacker will hide its real IP address. In this case, we have extended our ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2018 - Elsevier BV | Procedia Computer Science

Artigo Revisado por pares

Guang Yao, Jun Bi, Peiyao Xiao,

... improve the security of Internet. However, despite intermittent IP spoofing attacks, existing filtering mechanisms inspect each packet all ... article considers the requirement for a solution performing IP spoofing filtering with agility, which consumes resource in proportional to the size of attack. A novel IP spoofing filtering mechanism named Virtual Anti-Spoofing Edge (VASE) ... various scenarios. VASE is fully compatible with current IP spoofing filtering practices and can be implemented with commodity ...

Tópico(s): Network Packet Processing and Optimization

2012 - Elsevier BV | Computer Networks

Artigo Acesso aberto Revisado por pares

Natalija Vlajic, Mashruf Chowdhury, Marin Litoiu,

... the increased tightening of regulations and controls against IP spoofing by world-wide Internet service providers (ISPs). Three ... findings of our research on the regulation of IP spoofing in the acceptable-use and term-of-service ... policies make no explicit mention or prohibition of IP spoofing, thus failing to serve as a potential deterrent. ( ... experimental study on the actual practical feasibility of IP spoofing involving a select number of real-world Cloud providers. These results show that most of the tested public Cloud providers do a very good job of preventing (potential) hackers from using their virtual private servers to launch spoofed-IP campaigns on third-party targets. However, the same ...

Tópico(s): Information and Cyber Security

2019 - Multidisciplinary Digital Publishing Institute | Computers

Artigo Revisado por pares

Toby Ehrenkranz, Jun Li,

... article first looks into the current state of IP spoofing, then thoroughly surveys the current state of IP spoofing defense. It evaluates data from the Spoofer Project, ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2009 - Association for Computing Machinery | ACM Transactions on Internet Technology

Artigo Revisado por pares

Hongbo Zhou, Matt W. Mutka, Lionel M. Ni,

... uniqueness of address assignment in the presence of IP spoofing attacks, [state pollution] attacks, and Sybil attacks. The ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2009 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Acesso aberto Revisado por pares

Wei Chen, Dit‐Yan Yeung,

... bring about serious threats to the Internet. Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among different IP spoofing techniques, which include random spoofing, subnet spoofing and ... defend against TCP SYN flooding attacks under different IP spoofing types, including subnet spoofing. The method makes use ... defending against TCP-based flooding attacks under different IP spoofing types. Specifically, our method outperforms others in achieving ...

Tópico(s): Network Packet Processing and Optimization

2006 - Springer Science+Business Media | Telecommunication Systems

Artigo Acesso aberto Revisado por pares

Zhenhai Duan, Xin Yuan, Jaideep Chandrashekar,

... the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial ... IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our ...

Tópico(s): Network Packet Processing and Optimization

2008 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing

Artigo Acesso aberto

IP Spoofing is a serious threat to the legitimate use of the Internet. By employing IP spoofing, attackers can overload the destination network thus preventing ... IDPF) architecture that can minimize the level of IP spoofing on the Internet. A key feature of our ...

Tópico(s): Network Packet Processing and Optimization

2017 - | International Journal of Advance Engineering and Research Development

Capítulo de livro Acesso aberto Revisado por pares

Chris Masone, Kwang‐Hyun Baek, Sean W. Smith,

... Cookies in that it defends against both DNS spoofing and IP spoofing—and does not require binding a user's interaction with a server to individual IP addresses.

Tópico(s): Advanced Malware Detection Techniques

2007 - Springer Science+Business Media | Lecture notes in computer science

Artigo Revisado por pares

Karan Verma, Halabi Hasbullah,

... a large number of fake identities. Internet Protocol (IP) spoofing addresses is to disrupt the proper functioning of ... between two fast moving vehicles. In this paper, IP spoofing addresses of DoS attacks have been detected and ... for the legitimate vehicles in the VANET. The IP spoofing addresses in the DoS attacks committed by fraud ...

Tópico(s): Mobile Ad Hoc Networks

2014 - Hindawi Publishing Corporation | Security and Communication Networks

Artigo Revisado por pares

Guangwu Hu, Ke Xu, Jian Wu, Yong Cui, Fan Shi,

IP spoofing has nowadays become a research focus, as it has been bothering netizens since the emergence of ... have made their contributions to the prevention of IP-spoofing, the most excellent one is the SAVI (Source ... proposal advocated by IETF, since it can prevent IP-spoofing from happening by automatically binding the key properties ...

Tópico(s): Network Packet Processing and Optimization

2013 - Institute of Electrical and Electronics Engineers | IEEE Network

Artigo Acesso aberto Revisado por pares

Stavros Shiaeles, Maria Papadaki,

... to significant monetary costs and loss of reputation. IP spoofing is often used in DDoS attacks not only ... paper aims to propose a new multi-layer IP Spoofing detection mechanism, called fuzzy hybrid spoofing detector (FHSD), which is based on source MAC address, hop count, GeoIP, OS passive fingerprinting and web browser user agent. The hop count algorithm has been optimized to limit the need for continuous traceroute requests, by querying the subnet IP Address and GeoIP information instead of individual IP ...

Tópico(s): Advanced Malware Detection Techniques

2014 - Oxford University Press | The Computer Journal

Artigo Acesso aberto Revisado por pares

A. Yaar, Adrian Perrig, Daniel S. Song,

... which can be used to detect Internet protocol (IP) spoofing attacks with just a single attack packet. Finally, we discuss in detail StackPi's compatibility with IP fragmentation, applicability in an IPv6 environment, and several ...

Tópico(s): Network Packet Processing and Optimization

2006 - Institute of Electrical and Electronics Engineers | IEEE Journal on Selected Areas in Communications

Artigo Acesso aberto Revisado por pares

Prakash Veeraraghavan, Dalal Hanna, Eric Pardede,

... IP Address Spoofing attacks. One of the classical IP-spoofing attacks that cost several million dollars worldwide is ... of amplification attacks happening every day. Even though IP-Spoofing is one of the well-researched areas since ... an efficient and scalable solution to solve the IP-Spoofing problem that arises from malicious or compromised inside ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2020 - Multidisciplinary Digital Publishing Institute | Electronics

Artigo Acesso aberto

N. Arumugam,

... is source IP address spoofing.To avoid the IP spoofing a number of prevention approaches are proposed by ... ant-based traceback is proposed to detect the IP spoofing.The proposed traceback approach uses flow level information to identify the spoofing request.To validate the detection method further, this paper considers the number of hop needs to reach the destination end.Using a mapping between IP addresses and their flow level with hopcounts, the ...

Tópico(s): Advanced Malware Detection Techniques

2012 - | IOSR Journal of Engineering

Artigo Revisado por pares

Guang Yao, Jun Bi, Athanasios V. Vasilakos,

... data set. These results can help further reveal IP spoofing, which has been studied for long but never ...

Tópico(s): Advanced Malware Detection Techniques

2014 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Capítulo de livro

G. Dayanandam, T. Venkat Narayana Rao, D. Bujji Babu, S. Durga,

Distributed Denial-of-Service (DDoS) attacks overwhelm the critical resources of a target server in order to reject its services to the legitimate clients and attack mainly on the availability in the Confidentiality Integrity Availability (CIA) triad in Internet-based applications. In this paper, we analyze three major components of DDoS defense mechanisms such as DDoS detection, DDoS mitigation, and IP traceback. In the first step, we need to detect all DDoS attacks using any intrusion detection ...

Tópico(s): Network Packet Processing and Optimization

2018 - Springer International Publishing | Lecture notes in networks and systems

Artigo Acesso aberto Revisado por pares

Haining Wang, Cheng Jin, Kang G. Shin,

IP spoofing has often been exploited by Distributed Denial of Service (DDoS) attacks to: 1)conceal flooding sources and dilute localities in flooding traffic, and 2)coax legitimate hosts into becoming reflectors, redirecting and amplifying flooding traffic. Thus, the ability to filter spoofed IP packets near victim servers is essential to their own protection and prevention of becoming involuntary DoS reflectors. ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2007 - Institute of Electrical and Electronics Engineers | IEEE/ACM Transactions on Networking

Artigo Acesso aberto Revisado por pares

Xin Jin, Yaoxue Zhang, Yi Pan, Yuezhi Zhou,

... attacks. Moreover, attackers in MANETs cannot only use IP spoofing to conceal their real identities but also move ...

Tópico(s): Opportunistic and Delay-Tolerant Networks

2006 - Springer Nature | EURASIP Journal on Wireless Communications and Networking

Artigo Acesso aberto Revisado por pares

Chaoqin Zhang, Guangwu Hu, Guolong Chen, Arun Kumar Sangaiah, Pingan Zhang, Yan Xia, Weijin Jiang,

... which brings a good opportunity to solve the IP spoofing problem. By taking advantage of SDN, in this paper, we propose an SDN-based integrated IP source address validation architecture (ISAVA) which can cover ...

Tópico(s): Internet Traffic Analysis and Secure E-voting

2017 - Institute of Electrical and Electronics Engineers | IEEE Access

Artigo Acesso aberto

Reem K. Alqurashi, Ohoud S. Al-harthi, Sabah M. Alzahrani,

... attacks exploit IP address spoofing.This paper designates IP spoofing attacks and the projected approaches presently obtainable to ... is proposed to separate spoofed IP point, called IP Spoofing Area Approach (ISDA).The reason behind this method ... Stream based System Interruption Recognition Framework (FNIDS), recognizing IP address spoofing level and utilizing Fluffy rationale strategy naturally to ... observable improvement in the wake of applying the IP address spoofing discovery calculations.

Tópico(s): Cryptographic Implementations and Security

2020 - | International Journal of Engineering Research and Technology

Artigo Brasil Produção Nacional Revisado por pares

Osvaldo Fonseca, Ítalo Cunha, Elverton Fazzion, Wagner Meira, Brivaldo Alves da Silva, Ronaldo A. Ferreira, Ethan Katz-Bassett,

... spoof) the source IP address in packet headers. IP source spoofing is the basis for amplification denial-of-service ( ...

Tópico(s): Advanced Malware Detection Techniques

2021 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Network and Service Management

Artigo Revisado por pares

Bingyang Liu, Jun Bi, Athanasios V. Vasilakos,

IP spoofing-based flooding attacks are a serious and open security problem on the current Internet. The best ...

Tópico(s): Network Packet Processing and Optimization

2014 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security

Artigo Acesso aberto Revisado por pares

Jelena Mirković, Ezra Kissel,

IP spoofing exacerbates many security threats, and reducing it would greatly enhance Internet security. Seven defenses that filter ...

Tópico(s): Network Packet Processing and Optimization

2009 - IEEE Computer Society | IEEE Transactions on Dependable and Secure Computing