scispace - formally typeset
L

L. Kavisankar

Researcher at Anna University

Publications -  9
Citations -  43

L. Kavisankar is an academic researcher from Anna University. The author has contributed to research in topics: IP address spoofing & Spoofing attack. The author has an hindex of 3, co-authored 7 publications receiving 37 citations. Previous affiliations of L. Kavisankar include SRM University.

Papers
More filters
Proceedings ArticleDOI

A mitigation model for TCP SYN flooding with IP spoofing

TL;DR: This paper deals on attacks that consume all the bandwidth available to the victim machine and the prevention of this kind of attacks, the TCP specific probing is used in the proposed scheme where the client is requested to change the windows size/ cause packet retransmission while sending the ACK in the three way hand shake.
Posted Content

CNoA: Challenging Number Approach for uncovering TCP SYN flooding using SYN spoofing attack

TL;DR: The TCP specific probing is used in the proposed scheme where the client is requested challenging number while sending the ACK in the three way hand shake to find the Spoofed IP Packets/TCP SYN flood and preventing them.
Proceedings ArticleDOI

Efficient SYN Spoofing Detection and Mitigation Scheme for DDoS Attack

TL;DR: The work presented in this paper is experimented with Efficient Spoofed Mitigation Scheme (ESMS) which uses the TCP probing method along with the bloom filter trust model and provides accurate and robust information for the detection and controlling of the spoofed packets, during the DDoS attacks.
Journal ArticleDOI

A pioneer scheme in the detection and defense of DrDoS attack involving spoofed flooding packets

TL;DR: The real time experimental results showed the efficiency of the proposed Efficient Spoofed Flooding Defense scheme, by increasing the performance of the CPU up to 40%, the memory up to 52% and the network bandwidth up to 67%.
Book ChapterDOI

T-RAP: (TCP Reply Acknowledgement Packet) a Resilient Filtering Model for DDoS Attack with Spoofed IP Address

TL;DR: This paper deals on attacks that consume all the bandwidth available to the victim machine and uses the DHCP to statically assign the IP address based on the MAC address in a private environment to find the Spoofed IP Packets/TCP SYN flood and preventing them.