Tackling Spoofing Attacks Using Broadband Access Concentrators

Provided by: International Journal of Information and Electronics Engineering
Topic: Networking
Format: PDF
Spoofing based attacks have severe consequences and are wide-spread, but much of the present day Internet is ill-prepared to defend against them. To defend against spoofing effectively, devices at the edge of the Internet have a major role to play. This paper describes how one such set of devices, broadband access concentrators, can help in mitigating many of the well-known (e.g., IP spoofing and MAC spoofing) and not so well-known (e.g., PPPoE Session-ID spoofing and DHCP internal fields spoofing) types of spoofing.

Find By Topic