Repository logo
  • English
  • CatalĂ 
  • ÄŚeština
  • Deutsch
  • Español
  • Français
  • GĂ idhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • PortuguĂŞs
  • PortuguĂŞs do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • TĂĽrkçe
  • Tiáşżng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
    Communities & Collections
    All of DSpace
  • English
  • CatalĂ 
  • ÄŚeština
  • Deutsch
  • Español
  • Français
  • GĂ idhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • PortuguĂŞs
  • PortuguĂŞs do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • TĂĽrkçe
  • Tiáşżng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Lema, Hussein Sudi"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Loading...
    Thumbnail Image
    Item
    Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers
    (University of Dar es Salaam, 2016) Lema, Hussein Sudi
    This study examined mitigation of Internet Protocol (IP) spoofing attacks through validation of source IP address and warning provision to IP spoofing attackers. The main objective was to investigate how source IP address validation and warning provisions to IP spoofing attackers’ algorithms mitigate IP spoofing attacks. This study designed and developed source IP address validation and warning packets algorithms on LAN in a Python based OpenFlow (POX) controller. The results of algorithms from an IP spoofing attacker and a victim were determined. This study used Design Science Research Methodology (DSRM). Through its steps, this study revised more details from previous researches on the problem of IP spoofing attack. Finally, this study created algorithms on LAN by using Layer 3 Switch under the control of POX controller. Tools used to design and implement algorithms were Mininet emulator, POX controller, L3S, packet analyser and packet constructor. Algorithms were evaluated by collecting packets details through tcpdump program, terminal and log file. The results of this study revealed that algorithms identified all fake IP packets on LAN and packet with fake IP address returned to the attacker as warning packets in the form of User Datagram Protocol (UDP) packet. In addition, practical results indicated that an attacker fails to continue with the legitimate communication from other

About Library

The University of Dar es Salaam Library is a vital source of scholarly information that facilitates users to get access to learning and research resources during their studies. It provides access to a wide range of resources in both print and digital formats and conducive reading environment for users, regardless of their physical conditions. All registered users are eligible to access library resources and can borrow print materials from general shelves for a specific period of time.

Useful Links

Koha Staff Login

University Research Repository

WebMail

Aris

Book Study Room

Mara Oral History

Hansard

SOCIAL MEDIA

Instagram

Facebook

Twitter

YouTube

WhatsApp

Ask Librarian

Contact Us

Postal Address
P.O.Box 35092
Dar es Salaam

Call Us: +255 22 2410500/9 Ext. 2165 ; Direct line +255 22 2410241

Fax No:: +255 22 2410241

Email:: directorlibrary@udsm.ac.tz

2025 University of Dar es Salaam - University Of Dar Es Salaam Library
Term of use / Privacy Policy