Tackling Spoofing Attacks Using Broadband Access Concentrators

Authors

  • Bharat Joshi, D. T. V. Ramakrishna Rao, and Pavan Kurapati Author

Keywords:

Access concentrators, network security, spoofing.

Abstract

Spoofing based attacks have severe consequences 
and are wide-spread, but much of the present day Internet is ill-prepared to defend against them. To defend against spoofing effectively, devices at the edge of the Internet have a major role to play. This paper describes how one such set of devices, broadband access concentrators, can help in mitigating many of 
the well-known (e.g., IP spoofing and MAC spoofing) and not so well-known (e.g., PPPoE Session-ID spoofing and DHCP internal fields spoofing) types of spoofing. 

Downloads

Download data is not yet available.

Downloads

Published

07.03.2012

How to Cite

Tackling Spoofing Attacks Using Broadband Access Concentrators . (2012). International Journal of Information and Electronics Engineering, 2(2), 136-140. https://ijiee.org/index.php/ijiee/article/view/78