dc.creator |
Simba, Fatuma |
|
dc.creator |
Lema, Hussein |
|
dc.creator |
Ally, Abdullah |
|
dc.date |
2019-06-29T09:09:58Z |
|
dc.date |
2019-06-29T09:09:58Z |
|
dc.date |
2018-05 |
|
dc.date.accessioned |
2021-05-03T13:14:27Z |
|
dc.date.available |
2021-05-03T13:14:27Z |
|
dc.identifier |
978-1-905824-60-1 |
|
dc.identifier |
http://hdl.handle.net/20.500.11810/5270 |
|
dc.identifier.uri |
http://hdl.handle.net/20.500.11810/5270 |
|
dc.description |
Network intruders may spoof IP packets by modifying headers of the IP
packets in order to fool people to believe that the transmissions are originating from
trusted source. Consequently, various defencing mechanisms have been developed to
identify and prevent IP spoofing attacks. However, most of them were implemented
on either hosts or routers levels which utilizes a lot of shared resources on the
networks during the attacking process. On the contrary, this paper proposes an
algorithm for validating source IP address by using Layer Three Switches (L3S) in a
Local Area Network (LAN), which means that the IP spoofing attacks will be
identified and prevented without utilizing shared network resources. The study
employed Mininet network emulator, POX controller, L3S, packets analyzer, and
packet constructor to design and develop the algorithm. Results have shown that the
algorithm was capable of detecting and preventing IP spoofed packets on LAN
before L3S forward them to a target, and eventually an attacker was identified by
using his/her MAC address. |
|
dc.language |
en |
|
dc.publisher |
IST-Africa 2018 Conference Proceedings |
|
dc.subject |
Media Access Control (MAC), POX controller, Mininet, Layer Three Switch (L3S), spoofing packet |
|
dc.title |
Preventing Utilization of Shared Network Resources by Detecting IP Spoofing Attacks through Validation of source IP Address |
|
dc.type |
Conference Paper |
|