A novel solution for IP spoofing attacks

  • Authors:
  • Asma Basharat;Rabia Sirhindi;Ahmad Raza Cheema;Imtiaz Khokhar

  • Affiliations:
  • Information Security Department, College of Signals, National University of Sciences and Technology, Pakistan;Information Security Department, College of Signals, National University of Sciences and Technology, Pakistan;Information Security Department, College of Signals, National University of Sciences and Technology, Pakistan;Information Security Department, College of Signals, National University of Sciences and Technology, Pakistan

  • Venue:
  • ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

IP spoofing is one of the most common forms of on-line disguise. Hackers have long employed the tactic of disguising their true identity. It exploits the security weaknesses in TCP/IP protocol suite. This paper evaluates basic techniques to exploit vulnerabilities of TCP/IP protocol suite such as initial sequence number prediction and forging the source address. This paper covers certain threats and attack methods that employ IP spoofing and analyze preventive measures such as ingress and egress filtering at routers, authentication and encryption.