Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Securing IP Address to Control IP Spoofing


Affiliations
1 Rungta College of Engineering and Technology, Bhilai, C.G., India
2 Department of IComputer Science, Rungta College of Engineering and Technology, Bhilai, C.G., India
     

   Subscribe/Renew Journal


IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access. The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address. The origination address is only used by the destination machine when it responds back to the source Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. In this paper we try to introduce the IP address encryption using cryptography (specially the Blowfish algorithm) to Prevent by the ability of attackers to forge or spoof the source addresses in IP packets; it will maintain the session time between source node and the destination node to communicate and provide more secure channel to send data packet.

Keywords

Algorithm, Blowfish, DDoS, Forged, IP, IPsec, Network, Unauthorized Access, Spoofing, Threat.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 131

PDF Views: 3




  • Securing IP Address to Control IP Spoofing

Abstract Views: 131  |  PDF Views: 3

Authors

Rainey C. Lal
Rungta College of Engineering and Technology, Bhilai, C.G., India
Mridu Sahu
Department of IComputer Science, Rungta College of Engineering and Technology, Bhilai, C.G., India

Abstract


IP address spoofing refers to the creation of Internet Protocol packets with a forged source IP address, called spoofing, it is a method of attacking a network in order to gain unauthorized access. The distributed denial-of-service (DDoS) attack is a serious threat to the legitimate use of the Internet. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address. The origination address is only used by the destination machine when it responds back to the source Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP) networks. In this paper we try to introduce the IP address encryption using cryptography (specially the Blowfish algorithm) to Prevent by the ability of attackers to forge or spoof the source addresses in IP packets; it will maintain the session time between source node and the destination node to communicate and provide more secure channel to send data packet.

Keywords


Algorithm, Blowfish, DDoS, Forged, IP, IPsec, Network, Unauthorized Access, Spoofing, Threat.