IP spoofing defense: an introduction
In current Internet communication world, validity of source IP packet is and important issue. The problems of IP spoofing alarm the legitimate user of the Internet. This paper review recent progress of spoofing defenses by various researchers. Techniques and mechanisms proposed are being categorized...
| Main Authors: | Lee, Soon, Othman, Mohamed, Udzir, Nur Izura |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2009
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/59081/ http://psasir.upm.edu.my/id/eprint/59081/1/PID63.pdf |
Similar Items
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011)
by: Lee, Soon
Published: (2011)
IP spoofing defense: An introduction
by: Lee, Soon, et al.
Published: (2009)
by: Lee, Soon, et al.
Published: (2009)
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023)
by: Chai, Tze Uei
Published: (2023)
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)
by: Li, Siling
Published: (2012)
Narrative dissidence, spoof videos and alternative memory in China
by: Li, Siling
Published: (2015)
by: Li, Siling
Published: (2015)
Digital speech watermarking for anti-spoofing attack in speaker recognition
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
by: Nematollahi, Mohammad Ali, et al.
Published: (2014)
Proof of Concept: Network Vulnerability through Wi-Fi Spoofing
by: Cheong, Philip Zhi Qiang
Published: (2017)
by: Cheong, Philip Zhi Qiang
Published: (2017)
Mobility support across hybrid IP-based wireless environment : review of concepts, solutions and related issues.
by: Heidarinezhad, Mohammad Reza, et al.
Published: (2009)
by: Heidarinezhad, Mohammad Reza, et al.
Published: (2009)
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
by: Buja, Al Ya@Geogiana, et al.
Published: (2014)
Texture analysis using local ternary pattern for face anti-spoofing
by: Parveen, Sajida, et al.
Published: (2016)
by: Parveen, Sajida, et al.
Published: (2016)
Effective amplification mitigation and spoofing detection during DNS flooding attacks on internet
by: Hasan, Dana, et al.
Published: (2017)
by: Hasan, Dana, et al.
Published: (2017)
A GPS Spoofing Generator Using an Open Sourced Vector Tracking-Based Receiver
by: Meng, Q., et al.
Published: (2019)
by: Meng, Q., et al.
Published: (2019)
Speech codec for a Voice over IP (VoIP) systems
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
by: Abdul Satar, Azwan
Published: (2007)
by: Abdul Satar, Azwan
Published: (2007)
In defense of (extreme) monism
by: Garner, Jeremy
Published: (2016)
by: Garner, Jeremy
Published: (2016)
Malaysian IP Laws: Promoting IP commercialisation and challenges
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
IP To ATM Conversion Scheme
by: Yap , Lee Fueng
Published: (2004)
by: Yap , Lee Fueng
Published: (2004)
IP multicast
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
by: Mahfodh, Abdulrhman Mohammed, et al.
Published: (2011)
Defensive realism and the Concert of Europe
by: Rendall, Matthew
Published: (2006)
by: Rendall, Matthew
Published: (2006)
Is the future in VoIP
Published: (2008)
Published: (2008)
IP algorithms in compact rough classification modeling
by: Bakar, Azuraliza Abu, et al.
Published: (2001)
by: Bakar, Azuraliza Abu, et al.
Published: (2001)
The right of private defense against non-accountable offenders and in defense of the chastity of women under Islamic law
by: Owaydhah, Khalid A., et al.
Published: (2017)
by: Owaydhah, Khalid A., et al.
Published: (2017)
Prepaid And Postpaid Voice Over IP (VoIP) Architecture For Rural Areas
by: Ismail, Mohd Nazri
Published: (2007)
by: Ismail, Mohd Nazri
Published: (2007)
Analysis of Aerospace and Defense Industry- UK
by: Maity, Amitkumar
Published: (2012)
by: Maity, Amitkumar
Published: (2012)
Evolutionarily stable strategies for defensive switching
by: M., Saleem, et al.
Published: (2006)
by: M., Saleem, et al.
Published: (2006)
Performance of voice over IP (VoIP) over a wireless LAN (WLAN) for different audio/voice codecs
by: Mohd., Alias, et al.
Published: (2007)
by: Mohd., Alias, et al.
Published: (2007)
Determinants of defense expenditure in South Korea / Lee So Yeon
by: Lee , So Yeon
Published: (2020)
by: Lee , So Yeon
Published: (2020)
Design and development of dynamic queue storage and floating IP active measurement in IP networks
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
by: Tabbakh Farizani, Seyed Reza Kamel
Published: (2011)
Optimized performance data transmission in Mobile IP networks
by: Gholizadeh, Somayyeh, et al.
Published: (2014)
by: Gholizadeh, Somayyeh, et al.
Published: (2014)
Is the IP system gender bias?
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
by: Abdul Ghani Azmi, Ida Madieha
Published: (2016)
Online VLSM IP calculator
by: Mohd Azuwan, Efendy Mail
Published: (2010)
by: Mohd Azuwan, Efendy Mail
Published: (2010)
Demand for IP services to grow
Published: (2008)
Published: (2008)
Mobile IP implementation and testing
by: Pui, Chen Yung
Published: (2006)
by: Pui, Chen Yung
Published: (2006)
Secure mobile VoIP
by: Talevski, Alex, et al.
Published: (2007)
by: Talevski, Alex, et al.
Published: (2007)
The right of legitimate defense in contemporary international law
by: Medon, Ali Omar Moftah, et al.
Published: (2012)
by: Medon, Ali Omar Moftah, et al.
Published: (2012)
The right of legitimate defense in contemporary International Law
by: Ali Omar Moftah Medon,, et al.
Published: (2012)
by: Ali Omar Moftah Medon,, et al.
Published: (2012)
China a defensive not neo-imperial power
by: Dawson, Grant
Published: (2015)
by: Dawson, Grant
Published: (2015)
Offensive and defensive jihad according to Sayyid Qutb
by: Amir Husin bin Mohd Nor,
Published: (2001)
by: Amir Husin bin Mohd Nor,
Published: (2001)
U.S. Corrosion program and international defense cooperation
by: Hays, R., et al.
Published: (2015)
by: Hays, R., et al.
Published: (2015)
Similar Items
-
IP spoofing defense : current issues, trend and challenges.
by: Lee, Soon, et al.
Published: (2009) -
Enhanced IP spoofing defense through clustered interdomain packet filtering strategy
by: Lee, Soon
Published: (2011) -
IP spoofing defense: An introduction
by: Lee, Soon, et al.
Published: (2009) -
Detection and prevention schemes for ddos, arp
spoofing, and ip fragmentation attacks in smart factory
by: Chai, Tze Uei
Published: (2023) -
The platform of spoof videos: The case of Tudou.com
by: Li, Siling
Published: (2012)