JETIREXPLORE- Search Thousands of research papers



Published in:

Volume 7 Issue 5
May-2020
eISSN: 2349-5162

Unique Identifier

JETIR2005233

Page Number

659-662

Share This Article


Title

Spoof Proof

ISSN

2349-5162

Cite This Article

"Spoof Proof", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 5, page no.659-662, May-2020, Available :http://www.jetir.org/papers/JETIR2005233.pdf

Abstract

To create a robust mechanism which fends off all the attackers, who are trying to spoof the network with malicious resolve of DNS and ARP. The idea consists of a multi-phase modular structure which will work as a safeguarding mechanism to protect servers from intended attackers. This project would consist of two variable options which the user can use to defend their networks. These are namely, Defensive and Offensive options. These modes have two types of modes, through which the surveillance of the server is monitored. These are namely Active and Passive modes. Option 1: Defensive Option Defensive mode is the ultimate strategy for the user to defend the servers at all times by not letting the attacker into the servers. The defensive mode works in the gateway layer of the network and wouldn’t allow any changes in the network layer of the network. Option 2: Offensive Option The ARP spoofer will be immediately be disconnected from the server even if the attacker is already present in the network already. Mode 1: Active Mode Active mode uses active scanning method. Recommended while the system is idle most of the time. During an active scan, the client radio transmits a probe request and listens for a probe response from an AP. Mode 2: Passive Mode With a passive scan, the client radio listens on each channel for beacons sent periodically by an AP. A passive scan generally takes more time, since the client must listen and wait for a beacon versus actively probing to find an AP. Furthermore, the data losses could be minimized by tracking the exact pattern of the attackers exploitation by tools such as wireshark/tcpdump. Thus with this project, the system could entirely be protected from spoofing attacks.

Key Words

Spoofing, DNS, ARP, Networking, Cybersecurity, Shell, MAC.

Cite This Article

"Spoof Proof", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 5, page no. pp659-662, May-2020, Available at : http://www.jetir.org/papers/JETIR2005233.pdf

Publication Details

Published Paper ID: JETIR2005233
Registration ID: 232156
Published In: Volume 7 | Issue 5 | Year May-2020
DOI (Digital Object Identifier):
Page No: 659-662
ISSN Number: 2349-5162

Download Paper

Preview Article

Download Paper




Cite This Article

"Spoof Proof", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 5, page no. pp659-662, May-2020, Available at : http://www.jetir.org/papers/JETIR2005233.pdf




Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0008

Print This Page