dc.rights.license | In Copyright | en_US |
dc.creator | Djalaliev, Peter Liudmilov | |
dc.date.accessioned | 2023-10-20T17:40:09Z | |
dc.date.available | 2023-10-20T17:40:09Z | |
dc.date.created | 2005 | |
dc.identifier | WLURG038_Djalaliev_thesis_2005 | |
dc.identifier.uri | https://dspace.wlu.edu/handle/11021/36339 | |
dc.description.abstract | Billions of messages are transmitted across the Internet each day and most of these use the Internet Protocol (IP) to route packets to specific destinations based upon an IP address. While these packets contain both source and destination addresses, the protocol provides no means to verify the authenticity of the source. Therefore, packets can be sent with intentionally altered source addresses, known as spoofing, which in most cases is done for malicious purposes. IP spoofing is an integral part of various distributed denial-of-service attacks. Today, a number of methods of detecting spoofed IP packets have been studied in order to limit possible damage. These detection methods are classified as router-based and host-based, depending upon the site of implementation. Host-based detection methods are of particular interest because they can be implemented locally irregardless of the Internet service providers. The current research on host-based methods provides a number of possible solutions. However, there is insufficient data related to their efficacy. We evaluate the performance of the well known host-based spoofing detection methods under various circumstances and explore the ability of these methods to complement one another in order to improve their efficiency. | en_US |
dc.format.extent | 52 pages | en_US |
dc.language.iso | en_US | en_US |
dc.rights | This material is made available for use in research, teaching, and private study, pursuant to U.S. Copyright law. The user assumes full responsibility for any use of the materials, including but not limited to, infringement of copyright and publication rights of reproduced materials. Any materials used should be fully credited with the source. | en_US |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en_US |
dc.subject.other | Washington and Lee University -- Honors in Computer Science | en_US |
dc.title | Evaluating Host-Based Methods for Detecting Spoofed IP Packets | en_US |
dc.type | Text | en_US |
dcterms.isPartOf | WLURG038 - Student Papers | en_US |
dc.rights.holder | Djalaliev, Peter Liudmilov | en_US |
dc.subject.fast | TCP/IP (Computer network protocol) -- Security measures | en_US |
dc.subject.fast | Internet -- Security measures | en_US |
dc.subject.fast | Computer networks -- Security measures | en_US |
local.department | Computer Science | en_US |