Open Access Open Access  Restricted Access Subscription Access

A Systematic Review of IP Spoofing Attacks and Security Mechanisms in Modern Networks

Raghu Ram Chowdary Velevela

Abstract


IP address spoofing, commonly referred to as IP spoofing, involves generating Internet Protocol (IP) packets with a falsified source IP address to obscure the sender’s identity or mimic another system. Just as criminals have historically used disguises, aliases, or caller ID blocking to mask their identities, cybercriminals adopt similar tactics in digital environments. IP spoofing serves as a widely used method of online deception, enabling attackers to gain unauthorized access to networks or systems by forging an IP address to make malicious communications appear as though they originate from a trusted source. In the subsequent pages of this report, we will examine the concepts of IP spoofing: why it is possible, how it works, types, what it is used for and how to identify spoofing defend against it.

Full Text:

PDF

References


Rahman, L. F., & Zhou, R. (1997, December 16). IP address spoofing. CERT Advisory CA-1997-28: IP Denial-of-Service Attacks. CERT/CC.

Wikipedia. (n.d.). Wikipedia. Retrieved from https://www.wikipedia.com

SlideShare. (n.d.). SlideShare. Retrieved from https://www.slideshare.com

Kuehnlen, A. (n.d.). IP address spoofing. Retrieved from http://www.informatik.hu-berlin.de/~kuehnlen/spoofing/spoofing.pdf

Guidiri, M. (n.d.). Spoofing in network security. Retrieved from http://www.cs.unimagdeburg.de/~guidiri/seminar_netzwerk/Spoofing.pdf

Ballmann, B. (2012). Understanding network hacks: Attack and defense with Python (pp. 10-11). Springer-Verlag Berlin Heidelberg.

Kumar, B. K., Kumar, P. K., & Sukanesh, R. (2010). Hop count-based packet processing approach to counter DDoS attacks. In Proceedings of the International Conference on Recent Trends in Information, Telecommunication and Computing (pp. 271-273).

Swain, B. R., & Sahoo, B. (2009). Mitigating DDoS attack and saving computational time using a probabilistic approach and HCF method. In IEEE International Advance Computing Conference (IACC) (pp. 1170-1172).

Kumar, S., & Goudar, R. H. (2012). Cloud computing – Research issues, challenges, architecture, platforms, and applications: A survey. International Journal of Future Computer and Communication, 4(1).

Rani, S., Abhilasha, E., & Jindal, E. S. (2015). Implementation and analysis of identity spoofing attack using epidemic routing protocol in DTN. International Journal of Current Engineering and Scientific Research (IJCESR), 2(12).


Refbacks

  • There are currently no refbacks.