IDENTIFYING NETWORKS VULNERABLE TO IP SPOOFING

被引:0
作者
Muthusundari, S. [1 ]
Krishna, M. Tarun Sai [1 ]
Reddy, M. Govardhan [1 ]
Pavan, N. Dinakar Sai [1 ]
机构
[1] RMD Engn Coll, Dept CSE, Kavaraipettai, India
关键词
Internet; IP networks; Routing; Location awareness; Denial-of-service attack; Authentication; Volume measurement;
D O I
10.9756/INT-JECSE/V14I2.466
中图分类号
G76 [特殊教育];
学科分类号
040109 ;
摘要
This seeks to strengthen any company's security strategy by detecting weaknesses and ensuring that the security mechanisms in place give the protection that the company need. Administrators must conduct vulnerability assessments in order to discover network security weaknesses that might result in the compromise or destruction of devices or information as a consequence of exploits. The variety of these outputs makes further analysis challenging. Unauthorized users may acquire access to a typical user network as authorised agents. When people access internet networks without understanding it, they are being watched by a third party or another possibly dangerous person. The administrator or authorised person must also review the user networks, such as IP addresses and email, to protect against harmful actions.
引用
收藏
页码:4250 / 4255
页数:6
相关论文
共 10 条
  • [1] [Anonymous], 2016, AKAMAI Q4 2016 STATE
  • [2] On deterministic packet marking
    Belenky, Andrey
    Ansari, Nirwan
    [J]. COMPUTER NETWORKS, 2007, 51 (10) : 2677 - 2700
  • [3] Burch H, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE FOURTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XIV), P319
  • [4] Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks
    Czyz, Jakub
    Kallitsis, Michael
    Gharaibeh, Manaf
    Papadopoulos, Christos
    Bailey, Michael
    Karir, Manish
    [J]. PROCEEDINGS OF THE 2014 ACM INTERNET MEASUREMENT CONFERENCE (IMC'14), 2014, : 435 - 448
  • [5] Newman L. H., 2018, GitHub survived the biggest DDoS attack ever recorded
  • [6] An analysis of using reflectors for distributed denial-of-service attacks
    Paxson, V
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (03) : 38 - 47
  • [7] Prince M., 2014, Technical Details Behind a 400Gbps NTP Amplification DDoS Attack
  • [8] Network support for IP traceback
    Savage, S
    Wetherall, D
    Karlin, A
    Anderson, T
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2001, 9 (03) : 226 - 237
  • [9] Targett E, 2020, AWS HIT RECORD 2 3 T
  • [10] York K., 2016, DYN STATEMENT 10 21