

A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks
Abstract
References
Rahman, L. F., & Zhou, R. (1997, December 16). IP address spoofing. CERT Advisory CA-1997-28: IP Denial-of-Service Attacks. CERT/CC.
Wikipedia. (n.d.). Wikipedia. Retrieved from https://www.wikipedia.com
SlideShare. (n.d.). SlideShare. Retrieved from https://www.slideshare.com
Kuehnlen, A. (n.d.). IP address spoofing. Retrieved from http://www.informatik.hu-berlin.de/~kuehnlen/spoofing/spoofing.pdf
Guidiri, M. (n.d.). Spoofing in network security. Retrieved from http://www.cs.unimagdeburg.de/~guidiri/seminar_netzwerk/Spoofing.pdf
Ballmann, B. (2012). Understanding network hacks: Attack and defense with Python (pp. 10-11). Springer-Verlag Berlin Heidelberg.
Kumar, B. K., Kumar, P. K., & Sukanesh, R. (2010). Hop count-based packet processing approach to counter DDoS attacks. In Proceedings of the International Conference on Recent Trends in Information, Telecommunication and Computing (pp. 271-273).
Swain, B. R., & Sahoo, B. (2009). Mitigating DDoS attack and saving computational time using a probabilistic approach and HCF method. In IEEE International Advance Computing Conference (IACC) (pp. 1170-1172).
Kumar, S., & Goudar, R. H. (2012). Cloud computing – Research issues, challenges, architecture, platforms, and applications: A survey. International Journal of Future Computer and Communication, 4(1).
Rani, S., Abhilasha, E., & Jindal, E. S. (2015). Implementation and analysis of identity spoofing attack using epidemic routing protocol in DTN. International Journal of Current Engineering and Scientific Research (IJCESR), 2(12).
Refbacks
- There are currently no refbacks.