Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers
Date
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
This study examined mitigation of Internet Protocol (IP) spoofing attacks through validation of source IP address and warning provision to IP spoofing attackers. The main objective was to investigate how source IP address validation and warning provisions to IP spoofing attackers’ algorithms mitigate IP spoofing attacks. This study designed and developed source IP address validation and warning packets algorithms on LAN in a Python based OpenFlow (POX) controller. The results of algorithms from an IP spoofing attacker and a victim were determined. This study used Design Science Research Methodology (DSRM). Through its steps, this study revised more details from previous researches on the problem of IP spoofing attack. Finally, this study created algorithms on LAN by using Layer 3 Switch under the control of POX controller. Tools used to design and implement algorithms were Mininet emulator, POX controller, L3S, packet analyser and packet constructor. Algorithms were evaluated by collecting packets details through tcpdump program, terminal and log file. The results of this study revealed that algorithms identified all fake IP packets on LAN and packet with fake IP address returned to the attacker as warning packets in the form of User Datagram Protocol (UDP) packet. In addition, practical results indicated that an attacker fails to continue with the legitimate communication from other