← Back to VOLUME 4, ISSUE 5, MAY 2015
Detecting Spoofing Attack by Source using Path Information
Abstract: S. Savage et al. presented the approach that require both the victim and Network Admin[10]. As the packet arrive at the Router the packet is marked probablistically with partial path information. �Post-Morton� is performed by the attackers has the coressponding attack has been completed.
Keywords: IP Spoofing, Intruder, IP traceback, Path table, RBI
How to Cite:
[1] Jyothi, Mr. Pavan Kumar V, “Detecting Spoofing Attack by Source using Path Information,” International Journal of Advanced Research in Computer and Communication Engineering (IJARCCE), DOI: 10.17148/IJARCCE.2015.4598
