Various Techniques Involved in Detection and Controlling IP Spoofing

Provided by: International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE)
Topic: Mobility
Format: PDF
The Internet protocol suite is commonly known as TCP/IP protocol suite, because of its two important protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP). IP spoofing, also known as IP address forgery is a technique in which an attacker attacks on a host by masquerading as a trusted host. Attacker does so by modifying the IP packet header with a forged or spoofed source IP address field. Main purpose behind IP spoofing is to conceal true identity of the sender by impersonating another computing system. By employing IP spoofing, attackers remain hidden from detection and put a considerable limitation on the destination network or victim for policing attack packets.

Find By Topic