IP Spoofing & Its Detection Techniques for the Prevention of DOS Attacks
Recent Progress in Science and Technology Vol. 6,
6 March 2023
,
Page 49-57
https://doi.org/10.9734/bpi/rpst/v6/4583C
Abstract
The lack of authentication allows the host machines to spoof the IP address of targeted machine [1], this can allow the host machine to use the targeted machine for mean purposes or can use the resources of targeted machine. The targeted machine can be used as zombie machine and can be used for DDOS/DOS attacks. That’s why there is a need to secure IP addresses of all the machines communicated on any network.
Keywords:
- DDOS
- Distributed Denial of Service attack
- DOS
- Denial of Service attack
- IP
- Internet Protocol
How to Cite
Hafeez , H. ., & Khalil, T. . . (2023). IP Spoofing & Its Detection Techniques for the Prevention of DOS Attacks. Recent Progress in Science and Technology Vol. 6, 49–57. https://doi.org/10.9734/bpi/rpst/v6/4583C