A Dedicated Setup to Recognize Spoofing In LAN/ Wi-Fi via IP Configuration

Bhuvana Natarajan , Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; Nivetha Kuppusamy ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India; S. Nalini ,Jeppiaar Maamallan Engineering College, Chennai, Tamil Nadu, India

IP spoofing, Man in the Middle Attack (MITM), inbound and outbound rules, call traceback

In computer networks, it consists of policies and practises adopted to prevent and monitor unauthorised access. Networks can be both public and private where many of the counter attacks were practised. It is long known that IP spoofing or IP address spoofing is one of the major threats in communication protocol. IP spoofing is nothing but IP packets with forged source IP address, with purpose of concealing the identity of sender or impersonating an another computer system by forging the source address of packet header so it contains a different address, an attacker can make it appear that the packet was sent by a different machine .so that the IP spoofing comes into place. In existing, Passive IP trace back (PIT) that bypasses the deployment difficulties of IP trace back techniques. Though PIT cannot work in all the spoofing attacks and therefore we have proposed a novel idea, to restrict the Man in the Middle Attack (MITM) by providing inbound and outbound rules to avoid the challenges in operation. As long as the real origin of IP spoofing is not disclosed they cannot be deterred from launching further attacks. So the proposed solution ensures that the entity requesting for a service is an actual recipient by trace back the real identification of an attacker.
    [1] Yang Siang, Wanleizhou, Minviguo, “FLEXIBLE DETERMINISTIC PACKET MARKING: An IP Traceback system to find the real source of attacks”, IEEEsecurity and policy, (vol: 20, no 4, pp 567-580), 2009. [2] Shui,Keshavshood, Yongxiang,” An Effective and feasible traceback scheme in mobile internet environment”, IEEE communications letters(Volume 18,issue 11),2014. [3] Y.Bhavani, R.Sridevi,”IPtraceback through modified Probablistic Packet Marking algorithm using Chinese remainder theorem”, (Volume 6, issue 2), 2015. [4] Shui yu,wanlei zhou,Song guo,”Afeasible IP Traceback through ,“dynamic deterministic packet marking”, IEEEtrans on computers (Volume 65, issue 5), 2016. [5] Long Cheng, D.M.Divakaran, VL.Lthing “Opportunistic piggyback marking for IP Traceback”,IEEEtrans on info forensics and security (Volume 11,issue 2),2016. [6] Aqeel Sahi Khader,david lai,”preventing man-in-the-middlw attack in diffie hellman key exchange protocol”, telecommunication(ICT)22nd international conference,2015.
Paper ID: GRDJEV03I030050
Published in: Volume : 3, Issue : 3
Publication Date: 2018-03-01
Page(s): 40 - 43