Main Article Content
Abstract
IP Spoofing is a serious threat to the legitimate use of the Internet. By employing IP spoofing, attackers can overload the destination network thus preventing it from providing service to legitimate user. In this paper, we propose an inter domain packet filter (IDPF) architecture that can minimize the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. We show that, even with partial deployment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.
Keywords
IP spoofing
DDoS
BGP
ANT Colony Algorithm
network-level security and protection
AES algorithm.
Article Details
Authors retain the copyright without restrictions for their published content in this journal. IJSRTM is a SHERPA ROMEO Journal.
Publishing License
This is an open-access article distributed under the terms of
How to Cite
Paluskar, Y. S., Agarwal, P. M., Tambe, R. R., & Agarwal, S. N. (2015). CONTROLLING IP SPOOFING THROUGH INTER DOMAIN PACKET FILTERS. Students’ Research in Technology & Management, 1(3), 347-352. Retrieved from https://giapjournals.com/ijsrtm/article/view/78
References
- Zhenhai Duan, Xin Yuan and Jaideep Chandrashekar, Controlling IP Spoofing through
- Interdomain Packet Filters, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
- COMPUTING, VOL. 5, NO. 1, January-March 2008
- J. Stewart, BGP4: Inter-Domain Routing in the Internet. Addison-Wesley, 1999.
- Herbert Schildt, The Complete Reference JAVA 7th Edition,Tata McGraw Hill,2010.
- K. Park and H. Lee, “On the Effectiveness of Route-Based Packet Filtering for Distributed DoS
- Attack Prevention in Power-Law Internets,” Proc. ACM SIGCOMM, Aug. 2001.