Loading presentation...
Prezi is an interactive zooming presentation

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

IP Spoofing Detection Approach(ISDA)for Network Intrusion Detection System

No description
by

omkar mane

on 13 September 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of IP Spoofing Detection Approach(ISDA)for Network Intrusion Detection System

IP Spoofing Detection Approach(ISDA)
for Network Intrusion Detection System Problem Statement Conclusion is here Packets sent using the IP protocol include the IP address of the sending host
The recipient directs replies
to the sender using this source address
However, the correctness of this
address is not verified by the protocol.

The IP protocol specifies no method for validating the authenticity of the packet’s source.
This implies that an attacker can forge the source address to be any desired Presented by
Omkar Mane 46
Rajesh V. 70
Sajiv Nair 50
Jagdish Panda 52

Project Guide :
Mr. Tayyabali Sayyad Introduction
Problem Statement
Ip Spoofing
concept Of Spoofing
Attack Of Spoofing
Detection Of Spoofing
Methods Of Detection
Conclusion Area of project Network Security

IP spoofing as a method of attacking a network
Build a system which will be able to find IP Spoofed Packets so that it can be incorporated with Some other IDS Systems
Outcomes
IP Spoofing
Full transcript