Here we consider an everyday problem where the Hacker (attacker) makes use of the forged source IP addresses to launch attacks on the internet.
A hacker (attacker) can modify the source address of attacking traffic to address assigned to others or even unassigned to hide its actual location, or circumvent access control rules on source, or utilize the flaw of the victim system, or gain the capability of launching reflection-based attack.
Ip spoofing is an exploitation of trust-based relationship and can be curbed effectively if proper measures are used. Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect networks form these malicious cloaking and cracking techniques
Therefore, we provide software which detects those IP addresses and will notify the user about the forged IP address which is creating this content subsequently and will notify the user about it.