A Graph-based Methodology for Analyzing IP Spoofing Attack

  • Authors:
  • Voravud Santiraveewan;Yongyuth Permpoontanalarp

  • Affiliations:
  • -;-

  • Venue:
  • AINA '04 Proceedings of the 18th International Conference on Advanced Information Networking and Applications - Volume 2
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Firewalls offer a protection for private networksagainst both internal and external attacks. However,configuring firewalls to ensure the protections is adifficult task. The main reason is the lack of methodologyto analyze the security of firewall configurations. IPspoofing attack is an attack in which an attacker canimpersonate another person towards a victim. In thispaper, we propose a new methodology for verifying thevulnerability of firewall configurations to IP spoofingattack and for synthesizing IP spoofing-freeconfigurations. Our methodology is based on graphtheory which provides a simple and intuitive approach tothe vulnerability analysis of the attack.