{"title":"IP Spoofing Detection for Preventing DDoS Attack in Fog Computing","authors":"Amakan Elisha Agoni, M. Dlodlo","doi":"10.1109/GWS.2018.8686626","DOIUrl":null,"url":null,"abstract":"One of the biggest security threats to the availability of service in Fog Computing has been identified as Distributed Denial of Service (DDoS), whose attributes include IP address spoofing. In this paper, various methods for identifying spoofed IP packets in Fog Computing are discussed. In order to match the Operating System (OS) of incoming packet from its database, we proposed a Host-Based OS fingerprinting that uses both active and passive technique. Consequently, the proposed technique was implemented using the Xen Cloud Platform (XCP).","PeriodicalId":256742,"journal":{"name":"2018 Global Wireless Summit (GWS)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Global Wireless Summit (GWS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/GWS.2018.8686626","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
One of the biggest security threats to the availability of service in Fog Computing has been identified as Distributed Denial of Service (DDoS), whose attributes include IP address spoofing. In this paper, various methods for identifying spoofed IP packets in Fog Computing are discussed. In order to match the Operating System (OS) of incoming packet from its database, we proposed a Host-Based OS fingerprinting that uses both active and passive technique. Consequently, the proposed technique was implemented using the Xen Cloud Platform (XCP).