Abstract—Spoofing based attacks have severe consequences and are wide-spread, but much of the present day Internet is ill-prepared to defend against them. To defend against spoofing effectively, devices at the edge of the Internet have a major role to play. This paper describes how one such set of devices, broadband access concentrators, can help in mitigating many of the well-known (e.g., IP spoofing and MAC spoofing) and not so well-known (e.g., PPPOE Session-ID spoofing and DHCP internal fields spoofing) types of spoofing.
Index Terms—Access concentrators, network security, spoofing.
Bharat Joshi is with Infosys Ltd., Bangalore, India (e-mail:email@example.com).
D. T. V. Ramakrishna Rao is with Infosys Ltd., Bangalore, India (e-mail:firstname.lastname@example.org).
Pavan Kurapati is with Juniper Networks, USA (e-mail:email@example.com).
Cite: Bharat Joshi, D. T. V. Ramakrishna Rao, and Pavan Kurapati, "Tackling Spoofing Attacks Using Broadband Access Concentrators," International Journal of Information and Electronics Engineering vol. 2, no. 2, pp. 136-140, 2012.