On this page
Research Article | Open Access
Volume 14 2022 | None
IDENTIFYING NETWORKS VULNERABLE TO IP SPOOFING
Dr. S. Muthusundari, M. Tarun Sai Krishna, M. Govardhan Reddy, N. Dinakar Sai Pavan Associate Professor, Department of CSE, R.M.D. Engineering College, Kavaraipettai
Pages: 4250-4255
Abstract
This seeks to strengthen any company's security strategy by detecting weaknesses and ensuring that the security mechanisms in place give the protection that the company need. Administrators must conduct vulnerability assessments in order to discover network security weaknesses that might result in the compromise or destruction of devices or information as a consequence of exploits. The variety of these outputs makes further analysis challenging. Unauthorized users may acquire access to a typical user network as authorised agents. When people access internet networks without understanding it, they are being watched by a third party or another possibly dangerous person. The administrator or authorised person must also review the user networks, such as IP addresses and email, to protect against harmful actions
Keywords
Internet,IP networks,Routing,Location awareness,Denial-of-service attack,Authentication,Volume measurement
PDF
154
Views
58
Downloads