Abstract
It is clearly evident as the Internet continues to grow that it has become a prominent and dependable source for information, and tool for business-use. Our dependence on the Internet makes it critical to be able to distinguish between which types of attacks it can withstand and the types of attacks that will disable the network. Moreover, the understanding of the areas of vulnerability of the different types of networks will help find means of making it more secure in the future. With the existence of various forms of attacks against the network, network development should look ahead and strengthen the network to be able to manage itself under these intrusions. One type of these attacks is spoofing network services, where the attack will impersonate a legitimate service provider and undermine the trust-based relationship between the legitimate service provider and the machines in the system. Network services that will be involved are Address Resolution Protocol Spoofing, Routing Information Protocol Spoofing, and Dynamic Host Configuration Protocol. This paper will explain the different classifications of network attacks and describe how network service spoofing attack effect the network. Various platforms will be explored to determine how they perform under similar network service spoofing attacks.
Library of Congress Subject Headings
Computer networks--Security measures; Computer security; Internet service providers
Publication Date
2004
Document Type
Thesis
Student Type
Graduate
Degree Name
Information Sciences and Technologies (MS)
Department, Program, or Center
Information Sciences and Technologies (GCCIS)
Advisor
Peter Lutz
Advisor/Committee Member
Jim Leone
Advisor/Committee Member
Charlie Border
Recommended Citation
Lertlit, Yadasiri, "Network Disruption by Spoofing Service Attacks" (2004). Thesis. Rochester Institute of Technology. Accessed from
https://repository.rit.edu/theses/7555
Campus
RIT – Main Campus
Comments
Physical copy available from RIT's Wallace Library at TK5105.59 .L47 2004