IP spoofing
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science crazy
Super Moderator

Posts: 3,048
Joined: Dec 2008
22-09-2008, 09:34 AM


Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by "spoofing" the IP address of that machine. In the subsequent pages of this report, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.

Brief History of IP Spoofing

The concept of IP spoofing was initially discussed in academic circles in the 1980's. In the April 1989 article entitled: "Security Problems in the TCP/IP Protocol Suite", author S. M Bellovin of AT & T Bell labs was among the first to identify IP spoofing as a real risk to computer networks. Bellovin describes how Robert Morris, creator of the now infamous Internet Worm, figured out how TCP created sequence numbers and forged a TCP packet sequence. This TCP packet included the destination address of his "victim" and using an IP spoofing attack Morris was able to obtain root access to his targeted system without a User ID or password. Another infamous attack, Kevin Mitnick's Christmas Day crack of Tsutomu Shimomura's machine, employed the IP spoofing and TCP sequence prediction techniques. While the popularity of such cracks has decreased due to the demise of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators. A common misconception is that "IP spoofing" can be used to hide your IP address while surfing the Internet, chatting on-line, sending e-mail, and so forth. This is generally not true. Forging the source IP address causes the responses to be misdirected, meaning you cannot create a normal network connection. However, IP spoofing is an integral part of many network attacks that do not need to see responses (blind spoofing).


IP Spoofing exploits the flaws in TCP/IP protocol suite. In order to completely understand how these attacks can take place, one must examine the structure of the TCP/IP protocol suite. A basic understanding of these headers and network exchanges is crucial to the process.

2.1 Internet Protocol - IP

The Internet Protocol (or IP as it generally known), is the network layer of the Internet. IP provides a connection-less service. The job of IP is to route and send a packet to the packet's destination. IP provides no guarantee whatsoever, for the packets it tries to deliver. The IP packets are usually termed datagrams. The datagrams go through a series of routers before they reach the destination. At each node that the datagram passes through, the node determines the next hop for the datagram and routes it to the next hop. Since the network is dynamic, it is possible that two datagrams from the same source take different paths to make it to the destination. Since the network has variable delays, it is not guaranteed that the datagrams will be received in sequence. IP only tries for a best-effort delivery. It does not take care of lost packets; this is left to the higher layer protocols. There is no state maintained between two datagrams; in other words, IP is connection-less.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
seminar topics
Active In SP

Posts: 559
Joined: Mar 2010
30-03-2010, 11:22 AM

please read http://topicideas.org/how-to-ip-spoofing-seminar and presentation-report for getting more about IP spoofing
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: seminar topics on ip spoofing, seminar topics for computer science 2012 ip spoofing, ip spoofing a network threat, seminar on ip spoofing, ip topics in science, ip spoofing,
Popular Searches: ip spoofing ppt s, web spoofing applications, seminar presentation ip spoofing, disadvantages of ip spoofing, source code of attacker form for ip spoofing in java, abstract and introduction toip spoofing, ip spoofing browser,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,869 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  ip spoofing seminar report pdf jaseelati 0 200 18-12-2014, 02:17 PM
Last Post: jaseelati
  Report on Controlling IP Spoofing study tips 0 328 13-07-2013, 12:58 PM
Last Post: study tips
  ppt on IP Spoofing Attack study tips 0 486 06-04-2013, 04:16 PM
Last Post: study tips
  Detecting and Localizing Wireless Spoofing Attacks Report Abstract project girl 0 390 29-12-2012, 03:19 PM
Last Post: project girl
  IP SPOOFING project uploader 1 430 17-11-2012, 11:09 AM
Last Post: seminar tips
  Web Spoofing Seminar PPT project girl 0 464 02-11-2012, 11:15 AM
Last Post: project girl
  IP SPOOFING ppt seminar ideas 1 759 29-10-2012, 01:34 PM
Last Post: seminar flower
  ip spoofing seminar or presentation report computer science crazy 18 30,882 15-10-2012, 12:39 PM
Last Post: seminar tips
  IP address spoofing and its application seminar ideas 0 466 31-07-2012, 01:34 PM
Last Post: seminar ideas