Loading…
A two-way approach for detection and prevention of IP spoofing attacks
Several types of IP spoofing attacks such as the Man in the Middle Attacks and IP address spoofing are used to attack the flow of the network, and interrupt the communications over the networks, especially in the client-server systems. As opposed to most of the systems which are overly dependent on...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Several types of IP spoofing attacks such as the Man in the Middle Attacks and IP address spoofing are used to attack the flow of the network, and interrupt the communications over the networks, especially in the client-server systems. As opposed to most of the systems which are overly dependent on the cooperation of different Internet Service Providers with each other and with the system, not fast and robust, the proposed system provides security with an Encryption key. The proposed system also introduces K- means clustering for better file management, Support Vector Machine for the classification of details and a reactive approach. It finds the details and the location using Google map’s representational state transfer application programming interfaces based on the IP addresses so that the said attack can be stopped even before it dominates the system and gets access to the files. A passive approach also follows if the ISPs can block the hacker’s path or node in the hackers’ list and appropriate authorities take appropriate action. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0025453 |