• DocumentCode
    2044490
  • Title

    Constructing inter-domain packet filters to control IP Forging

  • Author

    Aluvala, Srinivas ; Rao, P. Srinivas

  • Author_Institution
    CSE Dept., Jayamukhi Inst. of Technol. Sci., Warangal, India
  • Volume
    5
  • fYear
    2011
  • fDate
    8-10 April 2011
  • Firstpage
    292
  • Lastpage
    295
  • Abstract
    IP spoofing is almost always used in what is currently one of the most difficult attacks to defend against-denial of service attacks, or DoS. Since crackers are concerned only with consuming bandwidth and resources, they need not worry about properly completing handshakes and transactions. Rather, they wish to flood the victim with as many packets as possible in a short amount of time. In order to prolong the effectiveness of the attack, they spoof source IP addresses to make tracing and stopping the DoS as difficult as possible. When multiple compromised hosts are participating in the attack, all sending spoofed traffic; it is very challenging to quickly block traffic. While some of the attacks described above are a bit outdated, Such as session hijacking for host-based authentication services, IP spoofing is still prevalent in network scanning and probes, as well as denial of service floods. However, the technique does not allow for anonymous Internet access, which is a common misconception for those unfamiliar with the practice. Any sort of spoofing beyond simple floods is relatively advanced and used in very specific instances such as evasion and connection hijacking.
  • Keywords
    IP networks; telecommunication security; IP forging; IP spoofing; host-based authentication services; interdomain packet filters; session hijacking; IP networks; Information filters; Internet; Peer to peer computing; Routing; BGP; DDoS; IDPF; IP Spoofing; Network-level Security and protection;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Electronics Computer Technology (ICECT), 2011 3rd International Conference on
  • Conference_Location
    Kanyakumari
  • Print_ISBN
    978-1-4244-8678-6
  • Electronic_ISBN
    978-1-4244-8679-3
  • Type

    conf

  • DOI
    10.1109/ICECTECH.2011.5942005
  • Filename
    5942005