|
Controlling IP Spoofing through PACKET FilteringKeywords: spoofing Abstract: IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access. The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address. The origination address is only used by the destination machine when it responds back to the source. We describe and evaluate route-based Packet Faltering (PF) of incoming data packets to find out it will be send by the legitimate user and using encryption techniques to encipher the IP address to Prevent the ability of attackers to forge or spoof the source addresses in IP packets and find out the malwares distributors to prevent the Drive-by-attack.Keywords: Spoofing, IP, legitimate user, PF, Router, encipher, DDoS, malwares, drive-by-attack
|