Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is IP Spoofing

Handbook of Research on Information Security and Assurance
A technique to gain unauthorized access to network. The hacker can do it by modifying the packet header then sending messages to a computer with an IP address indicating that the message is coming from a trusted host.
Published in Chapter:
Design and Implementation of a Distributed Firewall
Dalila Boughaci (LRIA-USTHB, Algeria), Brahim Oubeka (LRIA-USTHB, Algeria), Abdelkader Aissioui (LRIA-USTHB, Algeria), Habiba Drias (LRIA-USTHB, Algeria), and Belaïd Benhamou (Technopôle de Château-Gombert, France)
Copyright: © 2009 |Pages: 13
DOI: 10.4018/978-1-59904-855-0.ch013
This chapter presents the design and the implementation of a decentralized firewall. The latter uses autonomous agents to coordinately control the traffic on the network. The proposed framework includes a set of controllers’ agents that ensure the packets filtering services, a proxy agent that plays a role of a proxy server and an identifier agent which is responsible for user authentication. The decentralization of the different agents’ activities is managed by an administrator agent which is a core point for launching the most important operations of the access control. A prototype has been designed and implemented. Furthermore, the authors hope that the underlying framework will inform researchers of a possible way to implement a decentralized firewall to improve the current solution, and will help readers understand the need for techniques and tools such as firewalls that are useful to protect their network traffic.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR