Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

    • $39.99
    • $39.99

Publisher Description

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ―New form of attack on computers linked to Internet is uncovered‖, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This thesis is on ―Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention‖. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.

GENRE
Computers & Internet
RELEASED
2012
March 20
LANGUAGE
EN
English
LENGTH
63
Pages
PUBLISHER
GRIN Verlag
SELLER
Open Publishing GmbH
SIZE
4.1
MB
Network Infrastructure Security Network Infrastructure Security
2009
Network Protocols for Security Professionals Network Protocols for Security Professionals
2022
Synchronizing Internet Protocol Security (SIPSec) Synchronizing Internet Protocol Security (SIPSec)
2007
How to Cheat at VoIP Security How to Cheat at VoIP Security
2011
CEH Certified Ethical Hacker Cert Guide CEH Certified Ethical Hacker Cert Guide
2022
CompTIA Security+: Network Attacks CompTIA Security+: Network Attacks
2022