International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth |
Foundation of Computer Science USA |
ICFIDM2014 - Number 1 |
August 2015 |
Authors: Irene Getzi S, Shilpa Vijayan, and Sitamahalakshmi R |
51dfc3f6-b8f0-46c3-b2dd-21fdbedc7204 |
Irene Getzi S, Shilpa Vijayan, and Sitamahalakshmi R . IP Spoofing Prevention Methods using RPF and SPM. International Conference on Futuristic Innovations and Challenges to Diversity Management Emerging Technologies and Sustainability for Inclusive Industrial Growth. ICFIDM2014, 1 (August 2015), 7-11.
The Internet Protocol (IP) is a main protocol using for route information across the Internet. The role of IP is to provide best-effort services for the delivery of information to its destination. IP spoofing is a technique used to gain unauthorized access to host computers, so that the intruder can sends messages to another computer with an IP address indicating that the message is coming from a trusted host. IP address spoofing or IP spoofing is the creation of Internet Protocol (IP) packets with a source IP address, with the intention of hiding the identity of the sender or impersonating another computing system. In non-blind spoofing the hacker requires information about the sending host like OS, Sequence Number of packets, etc. But in blind spoofing attacker might not care about the source. A good network should have some strong Detection and Prevention methods against IP spoofing. The prevention methods can be classified as Host Based solutions, Router-Based Solutions and Solutions requiring the use of both Routers and End-Hosts. This paper contains an overview of two prevention methods, namely RPF (Reverse Path Forward) and SPM (Spoofing Prevention Method) and its analysis. And it also shortly describes some other methods like ACL, Packet filtering, etc. As both methods have its own advantages and disadvantages, this paper is about the promotion of SPM rather than RPF. We hope that our comparative study will be helpful for researcher to merge the advantages of both methods and propose a new technique so that a secured communication system can be built.