Thread Rating:
  • 1 Vote(s) - 1 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP

Posts: 694
Joined: Nov 2009
13-01-2010, 07:29 AM


Abstract: The Distributed Denial-of-Service (DDoS) attack is a serious threat to the legitimate use of the Internet. Prevention mechanisms are thwarted by the ability of attackers to forge or spoof the source addresses in IP packets. By employing IP spoofing, attackers can evade detection and put a substantial burden on the destination network for policing attack packets. In this paper, we propose an inter-domain packet filter (IDPF) architecture that can mitigate the level of IP spoofing on the Internet. A key feature of our scheme is that it does not require global routing information. IDPFs are constructed from the information implicit in Border Gateway Protocol (BGP) route updates and are deployed in network border routers. We establish the conditions under which the IDPF framework correctly works in that it does not discard packets with valid source addresses. Based on extensive simulation studies, we show that, even with partial deployment on the Internet, IDPFs can proactively limit the spoofing capability of attackers. In addition, they can help localize the origin of an attack packet to a small number of candidate networks.
Technology to use:JAVA
Use Search at wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Active In SP

Posts: 1,124
Joined: Jun 2010
27-09-2010, 03:53 PM

.ppt   idpf_infocom06.ppt (Size: 580 KB / Downloads: 128)
This article is presented by:
Zhenhai Duan, Xin Yuan
Department of Computer Science
Florida State University.

Jaideep Chandrashekar
Department of Computer Science
University of Minnesota

Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates

Route based packet filtering [K. Park, SIGCOMM 2001]
One can fake the identity, but not the route.
A router can decide whether it is in the path from the source to the destination and drop packets that are not supposed to be there.
Route based packet filtering Requirement:
The router must know the route between any pair of source and destination addresses.
Global topology information
Not available in BGP.

Is it possible to build route based packet filters from BGP updates?
If it is possible, what is the performance?

Autonomous Systems (ASes) are the basic units
The network can be modeled as an AS graph
Nodes are ASes and edges are BGP sessions
Nodes own network prefixes and exchange BGP route updates to learn the reachability of prefixes
Attributes associated with routes: AS path, prefix.

Policy based routing:
Route selection
Routing policies are usually decided by the AS relation

seminar paper
Active In SP

Posts: 6,455
Joined: Feb 2012
20-02-2012, 01:04 PM

to get information about the topic Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates full report ppt and related topic refer the link bellow

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: constructing inter domain packet filtering using bgp updates, porject to ip spoofing in java, seminar report on inter domain packet filter in networking, coding for the project construction of inter domain packet filters based on bgp updates, pdf controlling ip spoofing through inter domain packet filters coding free download, inter domain packet filtering using ip spoofing, hardware requiremnt of ip spoofing idpf bgp,
Popular Searches: controlling ipspoofing through inter domain packet filter ppt, report on filters, process in constructing robots, powered by smf internet explorer 7 updates, data flow diagram for controlling ip spoofing through inter domain packet filters, project on spoofing, ip spoofing project abstact,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Thumbs Up Inventory Control System uttuswami 2 720 20-10-2014, 07:46 PM
Last Post: CxWfRyIPv
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,789 02-06-2014, 09:51 AM
Last Post: seminar project topic
  Cross-Domain Privacy-Preserving Cooperative Firewall Optimization Vasudevan313 0 371 24-10-2013, 11:11 PM
Last Post: Vasudevan313
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 319 26-09-2013, 02:10 PM
Last Post: seminar projects maker
  RATIONSHOP INVENTORY CONTROL SYSTEM full report smart paper boy 17 6,809 20-09-2013, 09:47 AM
Last Post: seminar projects maker
  A Robust Image Watermarking Using Two Level DCT And Wavelet Packet Denoising PPT seminar projects maker 0 434 13-09-2013, 04:56 PM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 357 09-09-2013, 03:32 PM
Last Post: study tips
  Orthogonal Data Embedding for Binary Images in Morphological Transform Domain – A Hig project report helper 1 872 07-09-2013, 04:29 PM
Last Post: study tips
  Inter Bank Fund Transfer in Distributed Network smart paper boy 1 1,408 01-08-2013, 03:07 PM
Last Post: Guest
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 410 01-08-2013, 12:47 PM
Last Post: study tips