Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers

Date

2016

Journal Title

Journal ISSN

Volume Title

Publisher

University of Dar es Salaam

Abstract

This study examined mitigation of Internet Protocol (IP) spoofing attacks through validation of source IP address and warning provision to IP spoofing attackers. The main objective was to investigate how source IP address validation and warning provisions to IP spoofing attackers’ algorithms mitigate IP spoofing attacks. This study designed and developed source IP address validation and warning packets algorithms on LAN in a Python based OpenFlow (POX) controller. The results of algorithms from an IP spoofing attacker and a victim were determined. This study used Design Science Research Methodology (DSRM). Through its steps, this study revised more details from previous researches on the problem of IP spoofing attack. Finally, this study created algorithms on LAN by using Layer 3 Switch under the control of POX controller. Tools used to design and implement algorithms were Mininet emulator, POX controller, L3S, packet analyser and packet constructor. Algorithms were evaluated by collecting packets details through tcpdump program, terminal and log file. The results of this study revealed that algorithms identified all fake IP packets on LAN and packet with fake IP address returned to the attacker as warning packets in the form of User Datagram Protocol (UDP) packet. In addition, practical results indicated that an attacker fails to continue with the legitimate communication from other

Description

Available in print form, East Africana Collection, Dr. Wilbert Chagula Library, Class mark (THS EAF TK5105.59.L45)

Keywords

Computer networks, Computer network protocols

Citation

Lema, H. S. (2016) Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers,Master dissertation,University of Dar es Salaam, Dar es Salaam.