The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First come, First-Served Source Address Validation Improvement (FCFS SAVI)

Faculty Science Year: 2016
Type of Publication: ZU Hosted Pages:
Authors:
Journal: International Journal of Security, Privacy and Trust Management (IJSPTM) International Journal of Security, Privacy and Trust Management (IJSPTM) Volume:
Keywords : , Fight against , Spoofing Attacks: Network Ingress    
Abstract:
The IP(Internet Protocol) spoofing is a technique that consists in replacing the IP address of the sender by another sender’s address. This technique allows the attacker to send a message without being intercepted by the firewall. The
   
     
 
       

Author Related Publications

  • Mona Ahmed Mustafa Gharib, "Coverage Criteria for Testing SQL Queries", International Journal of Scientific and Engineering Research, 2015 More
  • Mona Ahmed Mustafa Gharib, "INTELLIGENT MULTIDIMENSIONAL DATABASE INTERFACE", International Journal of Scientific and Engineering Research, 2013 More
  • Mona Ahmed Mustafa Gharib, "Generalized multivariate EWMA control chart supplemented with bivariate ranked set techniques", Taylor and Francis Ltd, 2024 More
  • Mona Ahmed Mustafa Gharib, "CSsEv: Modelling QoS Metrics in Tree Soft Toward Cloud Services Evaluator based on Uncertainty Environment", American Scientific publishing group (ASPG), 2024 More
  • Mona Ahmed Mustafa Gharib, "Harnessing Tree Soft Set and Soft Computing Techniques' Capabilities in Bioinformatics: Analysis, Improvements, and Applications", University of New Mexico, 2023 More

Department Related Publications

  • Heba Ibrahim Mustafa, "On L- fuzzy generalized topology", Foundation of Computer Science,, 2013 More
  • Alaa Hassan Attia Hassan, "Certain New Classes of Analytic Functions with Varying Arguments", Hindawi Publishing Corporation, USA, 2013 More
  • Huda Ibrahim Sayed Ahmad, "Traveling Wave Solutions of the Nonlinear 3  1-Dimensional Kadomtsev-Petviashvili Equation Using the Two Variables G/G, 1/G-Expansion Method", Hindawi Publishing Corporation Journal of Applied Mathematics, 2012 More
  • Hassan Mostafa Metwally, "Granular Computing Biapproximation Spaces", IEEE, 2005 More
  • Roshdy Mohamed Farouk AbdulHameed, "Analytical analysis of image representation by their discrete wavelet transform", International Journal of Computer Science, 2008 More
Tweet