07-05-2012, 02:54 PM
IP SPOOFING
ip spoofing presentation.ppt (Size: 153 KB / Downloads: 74)
INTRODUCTION
In the April 1989, AT & T Bell a lab was among the first to identify IP spoofing as a real risk to computer networks.
IP spoofing is the creation of IP packets using forged (spoofed) source IP address.
Blind spoofing
This is a more sophisticated attack, because the sequence and acknowledgement numbers are unreachable. In order to circumvent this, several packets are sent to the target machine in order to sample sequence numbers.
Usually the attacker does not have access to the reply, and abuses trust relationship between hosts. For example:Host C sends an IP datagram with the address of some other host (Host A) as the source address to Host B. Attacked host (B) replies to the legitimate host (A)
Application of IP Spoofing:
Asymmetric routing (Splitting routing)
Asymmetric routing means traffic goes over different interfaces for directions in and out.
for any source IP address 'A' and destination 'B', the path followed by any packet (request or response) from 'A' to 'B' is different than the path taken by a packet from 'B' to 'A'.