SLGP Header

Modeling an Enhanced Deterministic Complex Packet Filter: Integrated Defense Mechanisms with SDMS

IJCSEC Front Page

Security of network can be made useless by breaking the secrecy, authentication, also when message integrity is not available. IP spoofing is the powerful technique used by attackers to disrupt the availability of services in the internet network by impersonating as a trusted source. Since the spoofed traffic shares the same resources as that of the legitimate one’s detection and filtering becomes very essential. Packet filtering is one defense against IP spoofing attacks. The gateway to a network usually performs ingress filtering, which is blocking of packets from outside the network with a source address inside the network. This prevents an outside attacker spoofing the address of an internal machine. The control model consists of spoofing defense monitoring system (SDMS), spoofed traffic detection module provides DDoS impact measurements in real time by monitoring the degradation in host and network performance metrics. The spoofed traffic detection module incorporates throttle algorithm to check the authenticity of incoming packet by means of source IP address and its corresponding hops to destined victim. Original scheme and other marking techniques help to find unnoticeable increased traffic size. Here analyze most of the attack types that cause serious problems in computer networks and defense techniques to stop or prevent these attacks.
Keywords:Security,Network, Authentication,SDMS


  1. Zhenhai Duan, Member IEEE, Xin Yuan and Jaideep Chandrashekar, Member, IEEE "Controlling IP Spoofing through Interdomain Packet Filters".
  2. Xiao He, Zidong Wang,Senior, Xiaofeng Wang, and D. H. Zhou,Senior Member, IEEE "Networked Strong Tracking Filtering with Multiple Packet Dropouts: Algorithms and Applications”, March 2014.
  3. Guang Yao, Jun Bi, Tao Feng, Peiyao Xiao, Duanqi Zhou, "Performing Software Defined Route-Based IP Spoofing Filtering with SEFA" Beijing, China.
  4. Resul Daş, Abubakar Karabade, Gurkan Tuna, Elazıg, Turkey "Common Network Attack Types and Defense Mechanisms“.
  5. Packet Travels in Network (3D Animation) – Vikas Kumar