Research Article | Open Access
IDENTIFYING NETWORKS VULNERABLE TO IP SPOOFING
Dr. S. Muthusundari, M. Tarun Sai Krishna, M. Govardhan Reddy, N. Dinakar Sai Pavan Associate Professor, Department of CSE, R.M.D. Engineering College, Kavaraipettai
Pages: 4250-4255
Abstract
This seeks to strengthen any company's security strategy by detecting weaknesses and ensuring that
the security mechanisms in place give the protection that the company need. Administrators must conduct
vulnerability assessments in order to discover network security weaknesses that might result in the compromise
or destruction of devices or information as a consequence of exploits. The variety of these outputs makes further
analysis challenging. Unauthorized users may acquire access to a typical user network as authorised agents.
When people access internet networks without understanding it, they are being watched by a third party or
another possibly dangerous person. The administrator or authorised person must also review the user networks,
such as IP addresses and email, to protect against harmful actions
Keywords
Internet,IP networks,Routing,Location awareness,Denial-of-service attack,Authentication,Volume measurement