Survey on IP Spoofing Detection and Prevention
DOI:
https://doi.org/10.20372/hjet.v1i2.81Keywords:
IP spoofing, IP spoofing detection, IP spoofing preventionAbstract
The weakness of the network layer in the OSI model allows an intruder to modify the original IP address of the packet and replace it with a forged IP address of the sender to mask the authentic or genuine IP address of the packet that transmits over a network. IP spoofing is the process in which the attackers change the actual IP address of the packet and replace it with a fake IP address and masquerade or impersonate legitimate users over the internet. Then, the attacker collects confidential information they can use or sell. Hence, this paper provides a survey on different art techniques used to detect and prevent IP spoofing over the internet (IP). Spoofed packet detection is included routing methods and non-routing methods. Hop count filtering by building IP2HC and other techniques are there. As we observed in many papers, a hop count filter is the most used technique to detect and prevent IP spoofing packets. Still, it has limitations on different Operating systems with different TTL (Time to live). Generally, the detection and prevention of IP spoofing can be implemented through artificial neural networks. It is more sophisticated when we compare them with other techniques of detecting and preventing Spoofed packets.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 Harla Journals and Author(s)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.