Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 17, Pages: 1-5
K. Shyamala1∗ and Shantha Visalakshi 2
Objectives: An important issue dealing with IP spoofing in the model of e-learning platform is studied to suggest mitigation techniques. Methods/Analysis: The paper proposing the wrapped up security does IP capturing at network level. This feature of IP capturing can be of no use when IP spoofing is carried out to disrupt the service. Studying IP spoofing techniques using tools such as n-map and by modifying the TCP and UDP headers using penetration testing tools reveals that IP spoofing can be used to disrupt the services offered by the e-learning systems. Findings: It is found that IP spoofing as observed is done in two ways. The first one is masking the IP using online IP masking tools and web sites. Offline tools such as TOR are also used to mask the IP. But it has been a great confusion learning the difference between the two methods of spoofing. The first method is actually masking IP which delivers the result of a request to the request initiator while spoofing does not send the response back to the initiator. Study reveals that this IP spoofing can be carried out in various methods which results in different types of attack scenarios and consequences. Conclusion/Application: This paper focuses on the techniques that are used to impersonate an IP. IP spoofing must be detected and blocked in order to provide e-learning as a service to authenticate users of the system which is analyzed in this paper.
Keywords: Distributed e-Learning, e-Learning, IP-Spoofing, Multi-Agent Co-Ordination, Security
Subscribe now for latest articles and news.