07-10-2014, 01:49 PM
IP SPOOFING
INTRODUCTION:
IP SPOOFING.docx (Size: 149.09 KB / Downloads: 10)
Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking.
It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques.
In the subsequent pages of this report, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.
WHAT IS IPSPOOFING?
An IP (Internet Protocol) address is the address that reveals the identity of your Internet service provider and your personal Internet connection. The address can be viewed during Internet browsing and in all of your correspondences that you send.
BRIEF HISTORY
The concept of IP spoofing was initially discussed in academic circles inthe 1980's.
In the April 1989 article entitled: “Security Problems in the TCP/Protocol Suite”, author S. M Bellovin of AT & T Bell labs was among the first to identify IP spoofing as a real risk to computer networks.
ADVANTAGES:
Multiple Servers :Sometimes you want to change where packets heading into your network will go. Frequently this is because you have only one IP address, but you want people to be able to get into the boxes behind the one with the `real' IP address.
Transparent Proxying :Sometimes you want to pretend that each packet which passes through your Linux box is destined for a program on the Linux box itself. This is used to make transparent proxies: a proxy is a program which stands between your network and the outside world, shuffling communication between the two. The transparent part is because your network won't even know it's talking to a proxy, unless of course, the proxy doesn't work.
DISADVANTAGES:
Blind to Replies: A drawback to ip source address spoofing is that reply packet will go back to the spoofed ip address rather than to the attacker. This is fine for many type of attack packet. However in the scanning attack as we will see next the attacker may need to see replies .in such cases, the attacker can not use ip address spoofing.
FUTURE SCOPE:
If the suggestion as given in my paper will be implemented practically; it is the most chances to free our internet from IP Spoofed Attack and also chances to explore my idea in future to enhance the security in the field of Internet & Network too.
CONCLUSION:
IP spoofing is less of a threat today due to the patches to the Unix Operating system and the widespread use of random sequence numbering.
Many security experts are predicting a shift from IP spoofing attacks to application-related spoofing in which hackers can exploit a weakness in a particular service to send and receive information under false identities.