2013 International Conference on Information Science and Applications (ICISA) 2013
DOI: 10.1109/icisa.2013.6579417
|View full text |Cite
|
Sign up to set email alerts
|

A Study on the IP Spoofing Attack through Proxy Server and Defense Thereof

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Other attackers use proxies to hide the identities of their hosting machines [22]. Hostnames of their web services, when queried using DNS, resolve to the IP addresses of the proxies.…”
Section: Non-flux Networkmentioning
confidence: 99%
“…Other attackers use proxies to hide the identities of their hosting machines [22]. Hostnames of their web services, when queried using DNS, resolve to the IP addresses of the proxies.…”
Section: Non-flux Networkmentioning
confidence: 99%
“…ToR networks [24], [36] and MAC/IP spoofing techniques [37]- [40] also fall short under the ID coupling problem given that: i) ToR networks are designed for fixed data networks (non-wireless) assuming a stable connection to the Internet and cannot scale in view of a wireless service scenario, and ii) not all mobile data users will be in position to effectively hide their physical network identifiers using such techniques due to their limited resources (e.g. energy, processing, spectrum).…”
Section: The Blockchain Anonymity Challengementioning
confidence: 99%
“…In [3], the paper proposed IP spoofing attack using proxy server. The communication between the attacker ,disguised as some other's actual IP address let say A, and the actual IP address is done via two or more proxy servers.…”
Section: Related Workmentioning
confidence: 99%
“…Under volume based attacks there is depletion of bandwidth which includes flooding attacks like UDP, ICMP. Also they have enlisted popular tools for DDOS attacks with their impact, resources and type of attack.In [3], the paper proposed IP spoofing attack using proxy server. The communication between the attacker ,disguised as some other's actual IP address let say A, and the actual IP address is done via two or more proxy servers.…”
mentioning
confidence: 99%