Grin logo
de en es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Título: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Tesis (Bachelor) , 2011 , 62 Páginas

Autor:in: Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ―New form of attack on computers linked to Internet is uncovered‖, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This thesis is on ―Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention‖. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.

Extracto


Table of Contents

Chapter 1: Introduction

1.1 Background

1.2 Outline

Chapter 2: Problem definitions & goals

2.1 Aims

2.2 Objectives

2.3 Research Plan

Chapter 3: IP address & IP Spoofing

3.1 IP address

3.2 Brief History of IP Spoofing

3.3 Background

3.4 Recent Attacks using IP Spoofing

3.5 Details of an Attack

3.6 Why IP Spoofing is easy?

3.7 Application

3.8 Why spoofed IP address

3.9 Internet Protocol – IP

3.10 TCP/IP Overview

3.10.1 Ethernet

3.10.2 Internet Protocol

3.10.3 Transmission Control Protocol

3.10.4 User Datagram Protocol

3.10.5 Internet Control Message Protocol

3.11 IP Spoofing structure

3.12 IP spoofing and IPv6

Chapter 4: IP Spoofing Attacks

4.1 Spoofing Attacks

4.1.1 Non-Blind Spoofing

4.1.2 Blind Spoofing

4.1.3 Hijacking an Authorized Session

4.1.4 Scanning

4.1.5 Sequence-Number Prediction

4.1.6 Determining the State of a Firewall

4.1.7 Man In the Middle Attack

4.1.8 Denial of Service Attack

4.1.9 Flooding

4.1.10 Attacks concerning the routing protocols

4.2 Host disabling

4.3 Packet Sequence Sampling and Prediction

4.4 Impersonating the Trusted Host

4.5 System Compromise

4.6 Misconceptions of IP Spoofing

4.7 The Effects of IP Spoofing

4.7.1 Service Denied

4.7.2 Corporate Espionage and Sabotage

4.7.3 External Invaders

4.8 Impact

Chapter 5: Spoofed Packet Detection

5.1 Spoofed Packets Detection Methods

5.1.1 Routing methods

5.1.2 Non-routing methods

5.2 Active Methods

5.2.1 TTL methods

5.2.2 Direct TTL probes

5.2.3 IP Identification Number

5.2.4 OS Fingerprinting

5.2.5 TCP Specific Methods

5.2.6 Flow Control

5.2.7 Packet Retransmission

5.2.8 Traceroute

5.3 Passive Methods?

5.3.1 Passive TTL Methods

5.3.2 OS Idiosyncrasies

5.4 Services vulnerable to IP spoofing

5.5 Software for IP Spoofing

Chapter 6: Challenges and Methods to stop IP Spoofing

6.1 How to Avoid IP Spoofing

6.1.1 Instructions

6.1.2 Challenges in IP Spoofing

6.1.3 Challenges in Prevention Solutions

6.1.4 Challenges in Distributed Denial of Service (DDoS) Attacks

6.1.5 Challenge in Anti-spoofing with Access Lists

6.2 IP Spoofing Prevention methods:

6.2.1 Compression

6.2.2 Cryptography:

6.3 Algorithm

6.4 Software to Stop IP Spoofing

Chapter 07: Future Works

Chapter 08: Conclusions

Research Objectives and Core Themes

The primary research objective of this thesis is to analyze the mechanics of IP spoofing and to propose effective detection and prevention methods to enhance the security of communication systems against such attacks.

  • Overview and historical background of IP address spoofing.
  • Classification and analysis of various IP spoofing attack types.
  • Investigation of reactive and proactive detection techniques.
  • Proposal of prevention strategies incorporating compression and cryptography.

Excerpt from the Thesis

3.6 Why IP Spoofing is easy?

Problem with the Routers. IP routing is hop by hop. Every IP packet is routed separately. The route of a IP packet is decided by all the routers the packet goes through.

Routers look at Destination addresses only.

Authentication based on Source addresses only.

To change source address field in IP header field is easy.[7]

Summary of Chapters

Chapter 1: Introduction: Provides an overview of the thesis scope and background information regarding IP addresses and the fundamental concepts of IP spoofing.

Chapter 2: Problem definitions & goals: Outlines the research aims, objectives, and the structured plan for conducting the study.

Chapter 3: IP address & IP Spoofing: Details the history, definitions, and technical characteristics of IP spoofing, including an overview of the TCP/IP protocol suite.

Chapter 4: IP Spoofing Attacks: Examines various types of spoofing attacks, such as man-in-the-middle and DoS, and their impacts on communication systems.

Chapter 5: Spoofed Packet Detection: Discusses active and passive methods to detect spoofed packets, including routing-based and host-based identification techniques.

Chapter 6: Challenges and Methods to stop IP Spoofing: Presents proposed prevention solutions, focusing on compression, cryptography, and filtering mechanisms.

Chapter 7: Future Works: Describes the planned experimental validation of the proposed prevention methods and expansion to IPv6.

Chapter 8: Conclusions: Summarizes the key findings and the contribution of the proposed methods to securing communication systems.

Keywords

IP address, IP Spoofing, TCP/IP, Compression, Cryptography, Network Security, Packet Filtering, DoS Attacks, Network Routing, OS Fingerprinting, Authentication, IPv4, IPv6, Data Integrity, Communication Security

Frequently Asked Questions

What is the primary focus of this thesis?

The thesis focuses on the mechanics of IP address spoofing, how it impacts modern communication systems, and strategies to detect and prevent such attacks.

What are the central thematic areas addressed in the work?

The work covers the technical structure of IP packets, the vulnerabilities in TCP/IP that allow spoofing, types of attack vectors, and potential countermeasures using system-wide security configurations.

What is the core research question or goal?

The goal is to determine how IP spoofing occurs and to propose and analyze effective methods—specifically utilizing compression and cryptography—to mitigate these risks and secure networks.

Which scientific methodology is employed?

The authors employ a comprehensive literature review combined with the design of a novel algorithmic approach to packet header security and prevention methods.

What topics are discussed in the main body?

The body covers the history of IP spoofing, specific attack types (non-blind/blind spoofing, DoS), detection methods (TTL, ID numbers, OS fingerprinting), and technical prevention solutions.

Which keywords define this research?

The research is defined by keywords such as IP Spoofing, TCP/IP, Network Security, Cryptography, Packet Filtering, and Authentication.

How does the author explain the ease of IP spoofing?

The author identifies that IP routing is hop-by-hop, routers rely primarily on destination addresses, source-based authentication is weak, and the source address field in the IP header is easily modifiable.

Why is the proposed prevention method specifically significant?

The authors propose a unique combination of compression and simple transformation functions (cryptography) to handle packet headers, aiming to minimize bandwidth overhead while reducing security vulnerabilities.

What is the difference between active and passive detection?

Active detection involves performing network actions (like sending probes) to verify source authenticity, whereas passive detection relies on observing and analyzing inherent packet characteristics (like TTL) without interaction.

Final del extracto de 62 páginas  - subir

Detalles

Título
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
Universidad
Patuakhali Science & Technology University
Curso
B.Sc.in CSE
Autores
Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor)
Año de publicación
2011
Páginas
62
No. de catálogo
V190620
ISBN (Ebook)
9783656155744
ISBN (Libro)
9783656156079
Idioma
Inglés
Etiqueta
today’s impact communication system spoofing detection prevention
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor), 2011, Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention, Múnich, GRIN Verlag, https://www.grin.com/document/190620
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  62  Páginas
Grin logo
  • Grin.com
  • Envío
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint