Please use this identifier to cite or link to this item:
http://localhost:8080/xmlui/handle/123456789/3185
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | A, Sheela Rini | - |
dc.date.accessioned | 2023-07-07T07:51:07Z | - |
dc.date.available | 2023-07-07T07:51:07Z | - |
dc.date.issued | 2017-06 | - |
dc.identifier.issn | 2393-8528 | - |
dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/3185 | - |
dc.description.abstract | Internet plays a vital role in the modern world. As the internet grows day by day the security problem also arises. Intruders spoof the packets by using their spoofed IP addresses. Nowadays installing Intrusion Detection Systems (IDS) coupled with firewalls, and monitoring networks enables us to quickly detect and react to unauthorized access. However, even if these tools can detect illegitimate activities, their sources cannot be identified. Denial of service and Distributed denial-of-service (DDoS) attacks present an Internet-wide threat. In Denial of service attacks huge amount of un-wanted packets are sent by the attacker to the IP address which they want to attack. The same attack is take place in DDos also but in a distributed manner. The reason is that denial of service (DoS) attacks, which have recently increased in number, can easily hide their sources and forge their IP addresses | en_US |
dc.language.iso | en_US | en_US |
dc.publisher | International Journal of Innovative Computer Science & Engineering | en_US |
dc.subject | Computer network management | en_US |
dc.subject | Computer network security, | en_US |
dc.subject | denial of service (DoS), | en_US |
dc.subject | IP traceback | en_US |
dc.title | EFFICIENT AUTHENTICATION SCHEME TO DETECT THE SPOOFER LOCATION USING PASSIVE IP TRACEBACK TECHNIQUES | en_US |
dc.type | Article | en_US |
Appears in Collections: | International Journals |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
EFFICIENT AUTHENTICATION SCHEME TO DETECT THE SPOOFER LOCATION USING PASSIVE IP TRACEBACK TECHNIQUES.docx | 11.89 kB | Microsoft Word XML | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.