Grin logo
en de es fr
Shop
GRIN Website
Publicación mundial de textos académicos
Go to shop › Ciencia de la Computación - IT-Security

Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Título: Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention

Tesis (Bachelor) , 2011 , 62 Páginas

Autor:in: Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor)

Ciencia de la Computación - IT-Security
Extracto de texto & Detalles   Leer eBook
Resumen Extracto de texto Detalles

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity of the sender or impersonating another computing system. On January 22, 1995, in an article entitled, ―New form of attack on computers linked to Internet is uncovered‖, John Markoff of the New York Times reported on the TCP/IP protocol suite's security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This thesis is on ―Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention‖. This paper contains an overview of IP address and IP Spoofing and its background. It also shortly discusses various types of IP Spoofing, how they attack on communication system. This paper also describes some methods to detection and prevention methods of IP spoofing and also describes impacts on communication system by IP Spoofing. We think that our proposed methods will be very helpful to detect and stop IP spoofing and give a secured communication system.

Extracto


Table of Contents

  • Chapter 1: Introduction
    • 1.1 Background
    • 1.2 Outline
  • Chapter 2: Problem definitions & goals
    • 2.1 Aims
    • 2.2 Objectives
    • 2.3 Research Plan
  • Chapter 3: IP address & IP Spoofing
    • 3.1 IP address
    • 3.2 Brief History of IP Spoofing
    • 3.3 Background
    • 3.4 Recent Attacks using IP Spoofing
    • 3.5 Details of an Attack
    • 3.6 Why IP Spoofing is easy?
    • 3.7 Application
    • 3.8 Why spoofed IP address
    • 3.9 Internet Protocol – IP
    • 3.10 TCP/IP Overview
      • 3.10.1 Ethernet
      • 3.10.2 Internet Protocol
      • 3.10.3 Transmission Control Protocol
      • 3.10.4 User Datagram Protocol
      • 3.10.5 Internet Control Message Protocol
    • 3.11 IP Spoofing structure
    • 3.12 IP spoofing and IPv6

Objectives and Key Themes

This thesis aims to explore the impact of IP spoofing on communication systems, focusing on its detection and prevention. The study examines the history, types, and mechanisms of IP spoofing attacks, analyzing its detrimental effects on network security and communication integrity.
  • Understanding the concept of IP spoofing and its history
  • Examining the vulnerabilities of communication systems to IP spoofing attacks
  • Analyzing various methods for detecting and preventing IP spoofing
  • Exploring the impact of IP spoofing on communication system reliability and security
  • Proposing strategies and techniques to enhance communication system security against IP spoofing

Chapter Summaries

  • Chapter 1: Introduction - This chapter provides a brief background on IP spoofing, outlining the significance of the research topic. It also presents the structure and organization of the thesis.
  • Chapter 2: Problem definitions & goals - This chapter elaborates on the research objectives, aims, and the overall plan for investigating IP spoofing and its impact on communication systems. It outlines the specific research questions and the methodologies employed in the study.
  • Chapter 3: IP address & IP Spoofing - This chapter delves into the concept of IP addresses and the fundamental mechanisms of IP spoofing. It explores the historical development of IP spoofing, its practical applications, and the reasons for its prevalence. The chapter also provides a detailed overview of the TCP/IP protocol suite, emphasizing its vulnerabilities to IP spoofing attacks. It discusses the structure of IP spoofing and its implications in the context of IPv6, the latest version of the Internet Protocol.

Keywords

This thesis focuses on key terms and concepts related to IP spoofing and its impact on communication systems. The primary areas of focus include IP addresses, IP spoofing, TCP/IP protocol, network security, attack detection and prevention, and secure communication.
Final del extracto de 62 páginas  - subir

Detalles

Título
Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention
Universidad
Patuakhali Science & Technology University
Curso
B.Sc.in CSE
Autores
Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor)
Año de publicación
2011
Páginas
62
No. de catálogo
V190620
ISBN (Ebook)
9783656155744
ISBN (Libro)
9783656156079
Idioma
Inglés
Etiqueta
today’s impact communication system spoofing detection prevention
Seguridad del producto
GRIN Publishing Ltd.
Citar trabajo
Sharmin Rashid Linta (Autor), Md. Ridgewan Khan (Autor), 2011, Today’s Impact on Communication System by IP Spoofing and Its Detection and Prevention, Múnich, GRIN Verlag, https://www.grin.com/document/190620
Leer eBook
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
  • Si ve este mensaje, la imagen no pudo ser cargada y visualizada.
Extracto de  62  Páginas
Grin logo
  • Grin.com
  • Page::Footer::PaymentAndShipping
  • Contacto
  • Privacidad
  • Aviso legal
  • Imprint