Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers

dc.contributor.authorLema, Hussein Sudi
dc.date.accessioned2020-05-20T07:49:30Z
dc.date.available2020-05-20T07:49:30Z
dc.date.issued2016
dc.descriptionAvailable in print form, East Africana Collection, Dr. Wilbert Chagula Library, Class mark (THS EAF TK5105.59.L45)en_US
dc.description.abstractThis study examined mitigation of Internet Protocol (IP) spoofing attacks through validation of source IP address and warning provision to IP spoofing attackers. The main objective was to investigate how source IP address validation and warning provisions to IP spoofing attackers’ algorithms mitigate IP spoofing attacks. This study designed and developed source IP address validation and warning packets algorithms on LAN in a Python based OpenFlow (POX) controller. The results of algorithms from an IP spoofing attacker and a victim were determined. This study used Design Science Research Methodology (DSRM). Through its steps, this study revised more details from previous researches on the problem of IP spoofing attack. Finally, this study created algorithms on LAN by using Layer 3 Switch under the control of POX controller. Tools used to design and implement algorithms were Mininet emulator, POX controller, L3S, packet analyser and packet constructor. Algorithms were evaluated by collecting packets details through tcpdump program, terminal and log file. The results of this study revealed that algorithms identified all fake IP packets on LAN and packet with fake IP address returned to the attacker as warning packets in the form of User Datagram Protocol (UDP) packet. In addition, practical results indicated that an attacker fails to continue with the legitimate communication from otheren_US
dc.identifier.citationLema, H. S. (2016) Mitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackers,Master dissertation,University of Dar es Salaam, Dar es Salaam.en_US
dc.identifier.urihttp://41.86.178.5:8080/xmlui/handle/123456789/11284
dc.language.isoenen_US
dc.publisherUniversity of Dar es Salaamen_US
dc.subjectComputer networksen_US
dc.subjectComputer network protocolsen_US
dc.titleMitigation of ip spoofing attacks through validation of source ip address and warning provision to ip spoofing attackersen_US
dc.typeThesisen_US

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Lema, Hussein Sudi.pdf
Size:
134.12 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: