Openly accessible

IP spoofing attack and its countermeasures

Xiang, Yang and Zhou, Wanlei 2004, IP spoofing attack and its countermeasures, in From information warfare to information operations: proceedings of the 5th Australian Information Warfare and Security Conference, Edith Cowan University, School of Management Information Systems, We-B Centre, Churchlands, W.A., pp. 52-60.

Attached Files
Name Description MIMEType Size Downloads
zhou-ipspoofingattack-2004.pdf Published version application/pdf 231.39KB 18

Title IP spoofing attack and its countermeasures
Author(s) Xiang, Yang
Zhou, Wanlei
Conference name Australian Information Warfare & Security. Conference (5th : 2004 : Perth, W.A.)
Conference location Perth, Australia
Conference dates 25-26 November 2004
Title of proceedings From information warfare to information operations: proceedings of the 5th Australian Information Warfare and Security Conference
Editor(s) William Hutchinson
Publication date 2004
Conference series Australian Information Warfare & Security Conference
Start page 52
End page 60
Publisher Edith Cowan University, School of Management Information Systems, We-B Centre
Place of publication Churchlands, W.A.
Keyword(s) IP spoofing
Denial of Service
Authentication
Encryption
Filtering
IP traceback
Legislation
Economic impact
Summary IP spoofing is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. It causes serious security problem in the cyber world, and is currently exploited widely in the information warfare. This paper at first introduces the IP spoofing attack through examples, technical issues and attacking types. Later its countermeasures are analysed in detail, which include authentication and encription, filtering and IP traceback. In particular, an IP traceback mechanism, Flexible Deterministic Packet Marking (FDPM) is presented. Since the IP spoofing problem can not be solved only by technology, but it also needs social regulation, the legal issues and economic impact are discussed in the later part.
ISBN 0729805697
9780729805698
Language eng
Field of Research 089999 Information and Computing Sciences not elsewhere classified
Socio Economic Objective 970108 Expanding Knowledge in the Information and Computing Sciences
HERDC Research category E1 Full written paper - refereed
Copyright notice ©2004, Edith Cowan University
Persistent URL http://hdl.handle.net/10536/DRO/DU:30005484

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 1079 Abstract Views, 18 File Downloads  -  Detailed Statistics
Created: Mon, 07 Jul 2008, 09:50:18 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.