UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 5
May-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2005233


Registration ID:
232156

Page Number

659-662

Share This Article


Jetir RMS

Title

Spoof Proof

Abstract

To create a robust mechanism which fends off all the attackers, who are trying to spoof the network with malicious resolve of DNS and ARP. The idea consists of a multi-phase modular structure which will work as a safeguarding mechanism to protect servers from intended attackers. This project would consist of two variable options which the user can use to defend their networks. These are namely, Defensive and Offensive options. These modes have two types of modes, through which the surveillance of the server is monitored. These are namely Active and Passive modes. Option 1: Defensive Option Defensive mode is the ultimate strategy for the user to defend the servers at all times by not letting the attacker into the servers. The defensive mode works in the gateway layer of the network and wouldn’t allow any changes in the network layer of the network. Option 2: Offensive Option The ARP spoofer will be immediately be disconnected from the server even if the attacker is already present in the network already. Mode 1: Active Mode Active mode uses active scanning method. Recommended while the system is idle most of the time. During an active scan, the client radio transmits a probe request and listens for a probe response from an AP. Mode 2: Passive Mode With a passive scan, the client radio listens on each channel for beacons sent periodically by an AP. A passive scan generally takes more time, since the client must listen and wait for a beacon versus actively probing to find an AP. Furthermore, the data losses could be minimized by tracking the exact pattern of the attackers exploitation by tools such as wireshark/tcpdump. Thus with this project, the system could entirely be protected from spoofing attacks.

Key Words

Spoofing, DNS, ARP, Networking, Cybersecurity, Shell, MAC.

Cite This Article

"Spoof Proof", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 5, page no.659-662, May-2020, Available :http://www.jetir.org/papers/JETIR2005233.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Spoof Proof", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 5, page no. pp659-662, May-2020, Available at : http://www.jetir.org/papers/JETIR2005233.pdf

Publication Details

Published Paper ID: JETIR2005233
Registration ID: 232156
Published In: Volume 7 | Issue 5 | Year May-2020
DOI (Digital Object Identifier):
Page No: 659-662
Country: Delhi, Delhi, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0003199

Print This Page

Current Call For Paper

Jetir RMS