CFP last date
20 January 2025
Reseach Article

An Improved Strategy for Detection and Prevention IP Spoofing Attack

by Huda Basim Said, Turkan Ahmed Khaleel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 182 - Number 9
Year of Publication: 2018
Authors: Huda Basim Said, Turkan Ahmed Khaleel
10.5120/ijca2018917667

Huda Basim Said, Turkan Ahmed Khaleel . An Improved Strategy for Detection and Prevention IP Spoofing Attack. International Journal of Computer Applications. 182, 9 ( Aug 2018), 28-31. DOI=10.5120/ijca2018917667

@article{ 10.5120/ijca2018917667,
author = { Huda Basim Said, Turkan Ahmed Khaleel },
title = { An Improved Strategy for Detection and Prevention IP Spoofing Attack },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2018 },
volume = { 182 },
number = { 9 },
month = { Aug },
year = { 2018 },
issn = { 0975-8887 },
pages = { 28-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume182/number9/29848-2018917667/ },
doi = { 10.5120/ijca2018917667 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:10:53.357398+05:30
%A Huda Basim Said
%A Turkan Ahmed Khaleel
%T An Improved Strategy for Detection and Prevention IP Spoofing Attack
%J International Journal of Computer Applications
%@ 0975-8887
%V 182
%N 9
%P 28-31
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Spoofing Attack is dangerous and complex to networks and clouds; an attacker fakes a legitimate user address and launches his attack. Those who control the cloud have a big role to play in preventing and detecting these attacks. This research focuses on enhancing an algorithm called HCF (Hop Count Filtering Algorithm) helps to get rid of the weaknesses of this algorithm.

References
  1. Ballmann, B. 2012. “Understanding Network Hacks: Attack and Defense with Python”. Springer-Verlag Berlin Heidelberg, pp.10-11.
  2. Kumar, B. K., Kumar, P. K. and Sukanesh, R. 2010. “Hop Count Based Packet Processing Approach to Counter DDoS Attacks”. International Conference on Recent Trends in Information, Telecommunication and Computing. pp. 271-273.
  3. Swain, B. R. and Sahoo, B. 2009. “Mitigating DDoS attack and Saving Computational Time using a Probabilistic approach and HCF method”. IEEE International Advance Computing Conference (IACC). pp. 1170-1172.
  4. Jin, C; Wang, H. and Shin, K. G. 2003. “Hop-Count Filtering: An Effective Defense Against Spoofed Traffic”. 10th ACM Conference Computer and Comm. pp. 30-41.
  5. Duan, Z.; Yuan, X. and Chandrashekar, J., 2008. “Controlling IP Spoofing through Interdomain Packet Filters”. IEEE Transactions on Dependable and Secure Computing. 5 (1).
  6. Devi, G. U.; Priyan, M. K.; Balan, E. V.; Nath, C. G. and Chandrasekhar, M., 2015. "Detection of DDoS Attack using Optimized Hop Count Filtering Technique". Indian Journal of Science and Technology , 8(26) .
  7. Ramachandra, G.; Iftikhar, M. and Khan, F. A. 2017. “A Comprehensive Survey on Security in Cloud Computing”. Elsevier B.V. ,pp. 466.
  8. Wang, H.; Jin, C. and Shin, K. G., 2007. "Defense Against Spoofed IP Traffic Using Hop-Count Filtering". IEEE/ACM Transactions on Networking (ToN), 15 (1).
  9. Zahid, H.; Arshad, A.; Khalid, M.; Saeed, B. and Rafique, A., 2013. "Implementation of Cloud Computing over the MAN and Analysis of DoS Attack". International Journal of Science and Advanced Technology(IJSAT), 3 (10).
  10. Patil, S., 2.15. "Implementation Of Updated Hop Count Filtering Using Time to live Probing". International Journal of Advanced Research in Science Management and Technology (ijarsmt), 1 (1).
  11. Babatunde, O. and Al-Debagy, O., 2014. "A Comparative Review Of Internet Protocol Version 4 (IPv4) and Internet Protocol Version 6 (IPv6)". International Journal of Computer Trends and Technology (IJCTT), 13 (1).
  12. Osanaiye, O..A. 2015. “Short Paper: IP Spoofing Detection for Preventing DDoS Attack in Cloud Computin”. 2015 18th International Conference on Intelligence in Next Generation Networks.
  13. Indu, P.; Joseph, S. E.; Sreelakshmi, M.C. and RemyaNair, T., 2017. "Enhancement of HOP Count Filtering Mechanism-An ANTI-IP Spoofing Technique". International Journal of Pure and Applied Mathematics, 114 (12).
  14. Patil, D.; Patil, P. and Patil, P., 2017. "Establishing Cloud Computing Security in trust-based Cloud Service Provider". International Journal of Engineering Technology Science and Research ( IJETSR). 4 (4).
  15. Kumar, S. and Goudar, R. H., 2012. "Cloud Computing – Research Issues, Challenges,Architecture, Platforms and Applications: A Survey". International Journal of Future Computer and Communication.  4 (1).
  16. Rani, S.; Abhilasha, E. and Jindal, E.S., 2015. "Implementation and Analysis of Identity Spoofing Attack Using Epidemic Routing Protocol in DTN". International Journal of Current Engineering and Scientific Research (IJCESR).  2 (12).
  17. Zander, S.; Armitage, G. and Branch P. 2006. “Covert Channels in the IP Time To Live Field”. Australian Telecommunication Networks & Applications Conference (ATNAC).
  18. Zander, S.; Armitage, G. and Branch, P. 2007. “An Empirical Evaluation of IP Time To Live Covert Channels”. 15th IEEE International Conference on Networks.
  19. Akhter, S.; Myers, J.; Bowen, C.; Ferzetti, S.; Belko, P. and Hnatyshin, V. 2013. “Modeling DDoS Attacks with IP Spoofing and Hop-Count Defense Measure Using OPNET Modeler”. Technical Report. Rowan University at Department of Computer Science.
  20. Wang, X.; Li, M. and Li, M. 2009. “A scheme of distributed hop-count filtering of traffic”. IET International Communication Conference on Wireless Mobile and Computing (CCWMC 2009).
Index Terms

Computer Science
Information Sciences

Keywords

Cloud Computing IP Spoofing Spoofing Attack time to live IP2HC table Hop Count Filtering (HCF).