Grin logo
en de es fr
Shop
GRIN Website
Publish your texts - enjoy our full service for authors
Go to shop › Computer Science - IT-Security

Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Title: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Bachelor Thesis , 2011 , 62 Pages

Autor:in: Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author)

Computer Science - IT-Security
Excerpt & Details   Look inside the ebook
Summary Excerpt Details

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ―New form of attack on computers linked to Internet is uncovered‖, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This thesis is on ―Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention‖. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.

Excerpt


Table of Contents

  • Chapter 1: Introduction
    • 1.1 Background
    • 1.2 Outline
  • Chapter 2: Problem definitions & goals
    • 2.1 Aims
    • 2.2 Objectives
    • 2.3 Research Plan
  • Chapter 3: IP address & IP Spoofing
    • 3.1 IP address
    • 3.2 Brief History of IP Spoofing
    • 3.3 Background
    • 3.4 Recent Attacks using IP Spoofing
    • 3.5 Details of an Attack
    • 3.6 Why IP Spoofing is easy?
    • 3.7 Application
    • 3.8 Why spoofed IP address
    • 3.9 Internet Protocol – IP
    • 3.10 TCP/IP Overview
      • 3.10.1 Ethernet
      • 3.10.2 Internet Protocol
      • 3.10.3 Transmission Control Protocol
      • 3.10.4 User Datagram Protocol
      • 3.10.5 Internet Control Message Protocol
    • 3.11 IP Spoofing structure
    • 3.12 IP spoofing and IPv6

Objectives and Key Themes

This thesis aims to explore the impact of IP spoofing on communication systems, focusing on its detection and prevention. The study examines the history, types, and mechanisms of IP spoofing attacks, analyzing its detrimental effects on network security and communication integrity.
  • Understanding the concept of IP spoofing and its history
  • Examining the vulnerabilities of communication systems to IP spoofing attacks
  • Analyzing various methods for detecting and preventing IP spoofing
  • Exploring the impact of IP spoofing on communication system reliability and security
  • Proposing strategies and techniques to enhance communication system security against IP spoofing

Chapter Summaries

  • Chapter 1: Introduction - This chapter provides a brief background on IP spoofing, outlining the significance of the research topic. It also presents the structure and organization of the thesis.
  • Chapter 2: Problem definitions & goals - This chapter elaborates on the research objectives, aims, and the overall plan for investigating IP spoofing and its impact on communication systems. It outlines the specific research questions and the methodologies employed in the study.
  • Chapter 3: IP address & IP Spoofing - This chapter delves into the concept of IP addresses and the fundamental mechanisms of IP spoofing. It explores the historical development of IP spoofing, its practical applications, and the reasons for its prevalence. The chapter also provides a detailed overview of the TCP/IP protocol suite, emphasizing its vulnerabilities to IP spoofing attacks. It discusses the structure of IP spoofing and its implications in the context of IPv6, the latest version of the Internet Protocol.

Keywords

This thesis focuses on key terms and concepts related to IP spoofing and its impact on communication systems. The primary areas of focus include IP addresses, IP spoofing, TCP/IP protocol, network security, attack detection and prevention, and secure communication.
Excerpt out of 62 pages  - scroll top

Details

Title
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
College
Patuakhali Science & Technology University
Course
B.Sc.in CSE
Authors
Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author)
Publication Year
2011
Pages
62
Catalog Number
V190620
ISBN (eBook)
9783656155744
ISBN (Book)
9783656156079
Language
English
Tags
today’s impact communication system spoofing detection prevention
Product Safety
GRIN Publishing GmbH
Quote paper
Sharmin Rashid Linta (Author), Md. Ridgewan Khan (Author), 2011, Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention, Munich, GRIN Verlag, https://www.grin.com/document/190620
Look inside the ebook
  • Depending on your browser, you might see this message in place of the failed image.
  • https://cdn.openpublishing.com/images/brand/1/preview_popup_advertising.jpg
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
  • Depending on your browser, you might see this message in place of the failed image.
Excerpt from  62  pages
Grin logo
  • Grin.com
  • Payment & Shipping
  • Contact
  • Privacy
  • Terms
  • Imprint