UGC Approved Journal no 63975(19)
New UGC Peer-Reviewed Rules

ISSN: 2349-5162 | ESTD Year : 2014
Volume 13 | Issue 3 | March 2026

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 12 Issue 4
April-2025
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2504B41


Registration ID:
560475

Page Number

l352-l357

Share This Article


Jetir RMS

Title

Hijacking Spoofing Attack & Defence Strategy Based On Secured Network protocols

Abstract

The communication networks are essential for sharing information, but they are also vulnerable to cyber threats like hijacking and spoofing attacks. These attacks allow hackers to take control of network connections, steal sensitive data, and disrupt services. This creates serious security risks, as unauthorized users can access private information, manipulate data, or interfere with communication systems. To protect networks from these threats, this paper introduces a security strategy based on secure network protocols. The strategy includes four key components: authentication, encryption, intrusion detection, and secure routing. Authentication ensures that only verified users and devices can access the network. This prevents hackers from pretending to be someone else to gain entry. Encryption protects data by converting it into a secure format that cannot be easily read or modified by attackers. This ensures that even if hackers intercept the data. Intrusion Detection Systems act as security guards, continuously monitoring the network for any suspicious activity. If an attack is detected, the system quickly takes action to stop it. Secure Routing ensures that data travels safely across the network, preventing attackers from redirecting or altering the flow of information. By combining these security techniques, the proposed strategy creates a strong defense against hijacking and spoofing attacks. It helps protect sensitive information, ensures secure communication, and minimizes the risk of cyber threats.

Key Words

Cite This Article

"Hijacking Spoofing Attack & Defence Strategy Based On Secured Network protocols", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.12, Issue 4, page no.l352-l357, April-2025, Available :http://www.jetir.org/papers/JETIR2504B41.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Hijacking Spoofing Attack & Defence Strategy Based On Secured Network protocols", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.12, Issue 4, page no. ppl352-l357, April-2025, Available at : http://www.jetir.org/papers/JETIR2504B41.pdf

Publication Details

Published Paper ID: JETIR2504B41
Registration ID: 560475
Published In: Volume 12 | Issue 4 | Year April-2025
DOI (Digital Object Identifier):
Page No: l352-l357
Country: Tiruppur, Tamil Nadu, India .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000157

Print This Page

Current Call For Paper

Jetir RMS