Robust IP Spoof Control Mechanism Through Packet Filters

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - Issue 2011 by IJCTT Journal
Volume-3 Issue-1                           
Year of Publication : 2012
Authors :S.Sri Harsha Naresh Reddy, S. Tulsi Prasad.

MLA

S.Sri Harsha Naresh Reddy, S. Tulsi Prasad."Robust IP Spoof Control Mechanism Through Packet Filters"International Journal of Computer Trends and Technology (IJCTT),V3(1):1-6 Issue 2012 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: - A new approach for detecting spoofed IP level, called IP Spoofing Detection Approach (ISDA), is proposed. The purpose of this approach is maximally to keep effective parts and remove forged parts of Source IP addresses under flooding attacks and dynamically configure flow aggregation scheme for flow-based network Intrusion detection to build the most effective intrusion detection approach. With the wide usage of internet in many fields, networks are being exposed to many security threats, such as distributed denial of service (DDoS) attack, worm/virus, and so on. So prevention failure of network security leads to the revealing of information or interruption of network services, thereby results in the enormous economic loss. In this paper, we propose an effective method for defense against IP spoofing attack, which is based on trace route and the cooperation with trusted adjacent nodes. IP Spoofing is a problem without an easy solution, since it’s inherent to the design of the TCP/IP suite. Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.. Intrusion Detection System (IDS) has been used to secure these environments for sharing their data over network and host based IDS approaches. The rapid improvements of intrusions in internet and other networks are the main factors responsible for the propagation of different threats and vulnerabilities in the computing environment. Now a days the Ids makes use of the signature based detection approach which detects the actions based on analyzing the patterns such as text, password, time etc. We present the results of the experiment, compare the method with others. The result demonstrates that the method can effectively and steadily detect the IP spoofing attack, thereby blocks it.

References-

[1] K. Xu, Z. Zhang, and S. Bhattacharya. "Profiling Internet Backbone Traffic: Behavior Models and Applications," Proc. of ACM SIGCOMM, Philadelphia, PA, USA, pp. 169–180, August 2005.
[2] S. H. Lee, H. J. Kim, J. C. Na, and J. S. Jang, "Abnormal traffic detection and its implementation," The 7th International Conference on Advanced Communication Technology, vol. 1, pp. 246–250, 2005.
[3] A. Soule, K. Salamatian, and N. Taft, "Combining Filtering and Statistical Methods for Anomaly Detection," Internet Measurement Conference 2005, Research, pp. 331–344, 2005.
[4] A. Bremler-Barr and H. Levy, "Spoofing prevention method," 24th Annual Jiont Conference of the IEEE Computer and Communications Societies, vol. 1, pp. 536–547, March 2005.
[5] S. J. Templeton and K. E. Levitt, "Detecting spoofed packets," DARPA Information Survivability Conference and Exposition, vol. 1, pp. 164–175, April 2003.
[6] Y. Xiang and W. L. Zhou, "Trace IP packets by flexible deterministic packet marking (FDPM)," Proceedings IEEE Workshop on IP Operations and Management, pp. 246–252, 2004.
[7] T. Baba and S. Matsuda, "Tracing network attacks to their sources," IEEE Internet Computing, vol. 6, pp. 20–26, 2002.
[8] I. B. Mopari, S. G. Pukale and M. L. Dhore, "Detection and defense against DDoS attack with IP spoofing," International Conference on Computing, Communication and Networking, 2008, pp. 1-5, Dec. 2008.
[9] L. Garber, "Denial-of-service attacks rip the Internet," IEEE Computer, vol. 33, pp. 12–17, April 2000.

Keywords— ISDA, DDoS, IP Spoofing, TCP/IP, IDS.