International Journal For Multidisciplinary Research

E-ISSN: 2582-2160     Impact Factor: 9.24

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 6 Issue 3 May-June 2024 Submit your research before last 3 days of June to publish your research paper in the issue of May-June.

Classifying IP Spoofing Requests Using Heuristic Fuzzy Computer Network Approach

Author(s) Ravula Kartheek, Battula Siva Kanaka Raju, D Jaya Sonia, Pinjala Gopinadh
Country India
Abstract Distributed Denial of Service (DoS) Attack This represents a serious problem for Internet communications. This problem is exacerbated if an attacker tampers with the data. Source IP address. Attackers can easily change the source IP address leads to unauthorized access to network resources. Many solutions are available. Please identify this issue in your research community. In this paper, we proposed a detection method that takes data flow into account. Metric. An attacker can change any field in the IP, so expect a packet hop count field. In this article, he will introduce one. A Heuristic Fuzzy Logic Approach to Spoofing Detection package. Effective implementation of fuzzy rules the two member functions HC and PTT are the Receive IP header. The classification of forged packets is as follows: Identify changes up close Hop count and packet transmission time due to fuzzy Membership function using fuzzy triangles Membership features.
Keywords spoofed IP address, DDOS attacks, hip count, data packet transfer
Field Computer > Network / Security
Published In Volume 6, Issue 2, March-April 2024
Published On 2024-03-20
Cite This Classifying IP Spoofing Requests Using Heuristic Fuzzy Computer Network Approach - Ravula Kartheek, Battula Siva Kanaka Raju, D Jaya Sonia, Pinjala Gopinadh - IJFMR Volume 6, Issue 2, March-April 2024. DOI 10.36948/ijfmr.2024.v06i02.15111
DOI https://doi.org/10.36948/ijfmr.2024.v06i02.15111
Short DOI https://doi.org/gtnkcb

Share this