The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First come, First-Served Source Address Validation Improvement (FCFS SAVI)

Faculty Science Year: 2016
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal of Security, Privacy and Trust Management (IJSPTM) International Journal of Security, Privacy and Trust Management (IJSPTM) Volume:
Keywords : , Fight against , Spoofing Attacks: Network Ingress    
Abstract:
The IP(Internet Protocol) spoofing is a technique that consists in replacing the IP address of the sender by another sender’s address. This technique allows the attacker to send a message without being intercepted by the firewall. The
   
     
 
       

Author Related Publications

  • Mona Ahmed Mustafa Gharib, "Coverage Criteria for Testing SQL Queries", International Journal of Scientific and Engineering Research, 2015 More
  • Mona Ahmed Mustafa Gharib, "INTELLIGENT MULTIDIMENSIONAL DATABASE INTERFACE", International Journal of Scientific and Engineering Research, 2013 More
  • Mona Ahmed Mustafa Gharib, "Generalized multivariate EWMA control chart supplemented with bivariate ranked set techniques", Taylor and Francis Ltd, 2024 More
  • Mona Ahmed Mustafa Gharib, "CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment", American Scientific publishing group (ASPG), 2024 More
  • Mona Ahmed Mustafa Gharib, "Harnessing Tree Soft Set and Soft Computing Techniques' Capabilities in Bioinformatics: Analysis, Improvements, and Applications", University of New Mexico, 2023 More

Department Related Publications

  • Hany Samih Bayoumi Ibrahim, "Passive and active controllers for suppressing the torsional vibration of multiple-degree-of-freedom system", Sage, 2014 More
  • Ahmed Mohamed Khedr Souliman, "SEP-CS: Effective Routing Protocol for Heterogeneous Wireless Sensor Networks", Ad Hoc & Sensor Wireless Networks, 2012 More
  • Ahmed Mohamed Khedr Souliman, "Minimum connected cover of a query region in heterogeneous wireless sensor networks", Information Sciences, 2013 More
  • Ahmed Mohamed Khedr Souliman, "IBLEACH: intra-balanced LEACH protocol for wireless sensor networks", Wireless Netw, 2014 More
  • Ahmed Mohamed Khedr Souliman, "AGENTS FOR INTEGRATING DISTRIBUTED DATA FOR FUNCTION COMPUTATIONS", Computing and Informatics,, 2012 More
Tweet