A two-way approach for detection and prevention of IP spoofing attacks

2020 
Several types of IP spoofing attacks such as the Man in the Middle Attacks and IP address spoofing are used to attack the flow of the network, and interrupt the communications over the networks, especially in the client-server systems. As opposed to most of the systems which are overly dependent on the cooperation of different Internet Service Providers with each other and with the system, not fast and robust, the proposed system provides security with an Encryption key. The proposed system also introduces K- means clustering for better file management, Support Vector Machine for the classification of details and a reactive approach. It finds the details and the location using Google map’s representational state transfer application programming interfaces based on the IP addresses so that the said attack can be stopped even before it dominates the system and gets access to the files. A passive approach also follows if the ISPs can block the hacker’s path or node in the hackers’ list and appropriate authorities take appropriate action.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    12
    References
    1
    Citations
    NaN
    KQI
    []