The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Secure Verification Technique for Defending IP

 ,
#
 The Internet Protocol (IP) is the source of Interne t transmission but an inadequate authentication tec hnique paves a  way for IP  spoofing. Since, IP spoofing initiates m ore attacks in the network, a  secure authentication  technique is required to  defend against spoofing attacks. In order to achiev e this, in this paper, we p ropose a (SVT)  for defending IP spoofing attacks.  Our technique authenticates IP address of each Auto nomous System (AS) using Neighbour Authentication ( NA) algorithm. The  algorithm  works  by  validating  NA  table  NA  construct ed  by  each  node.  The  NA  table  is  transmitted  securely  using  RC-6  encryption  algorithm.  In  addition  to  encryption,  ou r  technique  use  arithmetic  coding  to  compress  and  d ecompress  the  NA  table.  The  performance  of  our  technique  is  proved  t hrough  simulation  results.  Our  technique  incurs  low  overhead  and  significantly improves the performance of network.      


[1] Arumugam N. and Venkatesh C., A Dynamic Method to Detect IP Spoofing on Data Network Using Ant Algorithm, IOSR Journal of Engineering , vol. 2, no. 10, pp. 9-16, 2012.

[2] Arumugam N. and Venkatesh C., Novel Scheme for Detecting and Preventing Spoofed IP Access on Network using IP2HP Filter, ARPN Journal of Engineering and Applied Sciences , vol. 6, no. 12, pp. 1-10, 2011.

[3] Baloul F., Abdullah M., and Babikir E., Attributes-Based Alphabets Transformation Method for Text Compression, in Proceedings of the 1 st International Conference on Computing and Information Technology , Al-Madinah Al- Munawwarah, Saudi Arabia, pp. 192-197, 2012. SVT IPDF SVT IPDF SVT IPDF SVT IPDF 308 The International Arab Journal of Information Techn ology VOL. 13, NO. 2, March 2016

[4] Bhati G., Chakraverti A., and Ram D., Detecting and Preventing IP Spoofed Attack by Cryptography, in Proceedings of the 2 nd National Conference on Challenges and Opportunities in Information Technology , Mandi Gobindgarh, India, pp. 60-63, 2008.

[5] Duan Z., Yuan X., and Chandrashekar J., Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates, in Proceedings of the 25 th IEEE International Conference on Computer Communications INFOCOM , Barcelona, Spain, pp. 1-12, 2012.

[6] Duan Z., Yuan X., and Chandrashekar J., Controlling IP Spoofing Through Inter-Domain Packet Filters, IEEE Transactions on Dependable and Secure Computing , vol. 5, no. 1, pp. 22-36, 2008.

[7] Ehrenkranz T. and Li J., On the State of IP Spoofing Defense, available at: http://ix.cs.uoregon.edu/~lijun/pubs/papers/ehren kranz09spoofing.pdf, last visited 2012.

[8] Elbirt A., Yip W., Chetwynd B., and Paar C., An FPGA Implementation and Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists, IEEE Transactions on Very Large Scale Integration Systems , vol. 9, no. 4, pp. 545-557, 2001.

[9] Farhat H., A Memory Efficient Anti-Spoofing Method, available at: http://www.softcomputing.net/jias/farhat.pdf, last visited 2012.

[10] Hosam A., Mustafa A., Ahmad S., and Abbas M., Exception Agent Detection System for IP Spoofing Over Online Environments, International Journal of Computer Science and Information Security , vol. 6, no. 1, pp. 158-164 2009.

[11] Howard P. and Vitter J., Analysis of Arithmetic Coding for Data Compression, Information Processing and Management , vol. 28, no. 6, pp. 749-764, 1994.

[12] John E. and Thaseen S., Efficient Defense System for IP Spoofing in Networks, available at: http://airccj.org/CSCP/vol2/csit2416.pdf, last visited 2012.

[13] Joshi B., Rao D., and Kurapati P., Tackling Spoofing Attacks using Broadband Access Concentrators, International Journal of Information and Electronics Engineering , vol. 2, no. 2, pp. 136-140, 2012.

[14] Kissel E. and Mirkovic J., Comparative Evaluation of Spoofing Defenses, in Proceedings of IEEE Transactions on Dependable and Secure Computing , California, USA, pp. 218-232, 2011.

[15] Lagishetty S., Sabbu P., and Srinathan K., DMIPS-Defensive Mechanism against IP Spoofing, in Proceedings of the 16 th Australasian Conference on Information Security and Privacy , Melbourne, Australia, pp. 276-291, 2011.

[16] Network Simulator., available at: http://www.isi.edu/nsnam/ns/, last visited 2012.

[17] ns-BGP 2.0 for ns-2.33., available at: http://www2.ensc.sfu.ca/~ljilja/cnl/projects/BGP- ns-2.33/ns-bgp.html, last visited 2012.

[18] Sahu M. and Lal R., Controlling IP Spoofing Through Packet Filtering, International Journal on Computer Technology and Applications , vol. 3, no. 1, pp. 155-159, 2012.

[19] Singh J., Kaur L., and Gupta S., A Cross-Layer Based Intrusion Detection Technique for Wireless Networks, the International Arab Journal of Information Technology , vol. 9, no. 3, pp. 201-207, 2012.

[20] Wang H., Jin C., and Shin K., Defense Against Spoofed IP Traffic using Hop-Count Filtering, IEEE/ACM Transactions on Networking , vol.15, no. 1, pp. 40-53, 2007.

[21] Yaar A., Perrig A., and Song D., Pi: A Path Identification Mechanism to Defend Against DDoS Attacks, in Proceedings of IEEE Symposium on Security and Privacy , California, USA, pp. 93-107, 2003. Alwar Rengarajan received BE degree from the Madurai Kamaraj University, Madurai, India in 2000, the ME degree from Sathyabama University, India, in 2005 and the PhD degree from Bharath University, India, in 2011. From 2000 to 2011, he worked at different levels in vari ous reputed engineering colleges across India. Currentl y, he is an Associate Professor in the Department of Information Technology at Veltech Multitech SRS Engineering College, Chennai, India. His research interests are in Network Security, Mobile Communication and Data Warehousing and Data Mining. He has published more than 20 research articles in various International Journals and Conference proceedings. He is acting as a reviewer in various National and International Journals. He cha ired various International and National Conferences. Secure Verification Technique for Defending IP Spoofing Attacks 309 Rajendran Sugumar received the BE degree from the University of Madras, India in 2003, the M.Tech degree from M.G.R. Educational and Research Institute, India, in 2007 and the PhD degree from Bharath University, Chennai, India, in 2011. From 2003 to 2011, he worked at different levels in various reputed engineering colleges across India. Currently, he is an Associate Professor in the Department of Computer Science and Engineering at Veltech Multitech SRS Engineering College, India. H is research interests are in Data mining, cloud comput ing and networks. He has published more than 20 researc h articles in various international journals and conf erence proceedings. He is acting as a reviewer in various national and international journals. He chaired var ious International and National Conferences. Chinnappan Jayakumar has more than 14 years of teaching and research experience. He did his Postgraduate in ME in Computer Science and Engineering at College of engineering, Guindy and PhD in Computer Science and Engineering at Anna University, India. Currently, he is working as Professor in the Department of Computer Science and Engineering, RMK Engineering College. He has published more than 35 research papers in High Impa ct factor International Journal, National and Internat ional conferences and visited many countries like USA and Singapore. He has guiding a number of research scholars in the area adhoc network, security in sen sor networks, mobile database and data mining under Anna University Chennai, Anna University of Technology, Sathyabama University and Bharathiyar University. He conducted various National Conferences, Staff Development Program, Workshop, Seminar in associated with Industries like Infosys and TCS. He has received Rs 22 Lakhs Grant from AICTE for RPS Project and Staff Development Program. He chaired various International and National Conferences. He was Advisor and Technical Committee Member for many International and National Conferences.