ip spoofing seminars report
#7


[attachment=8155]
BY

ASHISH KUMAR

BT – IT

UNDER GUIDANCE OF

MRS.ASHA JYOTI



IP SPOOFING ?

IP Spoofing is a technique used to gain unauthorized access to computers.
IP: Internet Protocol
Spoofing: using somebody else’s information
Exploits the trust relationships
Intruder sends messages to a computer with an IP address of a trusted host.

WHY IP SPOOFING IS EASY ?

Problem with the Routers.
Routers look at Destination addresses only.
Authentication based on Source addresses only.
To change source address field in IP header field is easy

IP SPOOFING STEPS

Selecting a target host (the victim)
Identify a host that the target “trust”
Disable the trusted host, sampled the target’s TCP sequence
The trusted host is impersonated and the ISN forged.
Connection attempt to a service that only requires address-based authentication.
If successfully connected, executes a simple command to leave a backdoor.

Spoofing Attacks

Spoofing is classified into :-

1. Non-blind spoofing :
This attack takes place when the attacker is on the same subnet as the target that could see sequence and acknowledgement of packets.

2. Blind spoofing :
This attack may take place from outside where sequence and acknowledgement numbers are unreachable. Attackers usually send several packets to the target machine in order to sample sequence numbers, which is doable in older days .

3. Denial of Service Attack :
IP spoofing is almost always used in denial
of service attacks (DoS), in which attackers
are concerned with consuming bandwidth
and resources by flooding the target with as
many packets as possible in a short amount
of time.

4. SMURF ATTACK :
Send ICMP ping packet with spoofed IP source address to a LAN which will broadcast to all hosts on the LAN
Each host will send a reply packet to the spoofed IP address leading to denial of service

5. Man - in - the – middle :
Packet sniffs on page link between the two
endpoints, and therefore can pretend to
be one end of the connection.


Detection of IP Spoofing

1. If you monitor packets using network-monitoring software such as netlog, look for a packet on your external interface that has both its source and destination IP addresses in your local domain. If you find one, you are currently under attack.

2. Another way to detect IP spoofing is to compare the process accounting logs between systems on your internal network. If the IP spoofing attack has succeeded on one of your systems, you may get a log entry on the victim machine showing a remote access; on the apparent source machine, there will be no corresponding entry for initiating that remote access .

IP-Spoofing Counter-measures

No insecure authenticated services
Disable commands like ping
Use encryption
Strengthen TCP/IP protocol
Firewall
IP trace back

IP Trace-back
To trace back as close to the attacker’s location as possible
Limited in reliability and efficiency
Require cooperation of many other network operators along the routing path
Generally does not receive much attention from network operators

Misconception of IP Spoofing
A common misconception is that "IP Spoofing" can
be used to hide your IP address while surfing the
Internet, chatting on-line, sending e-mail, and so
forth.

This is generally not true. Forging the source IP
address causes the responses to be misdirected,
meaning you cannot create a normal network
connection. However, IP spoofing is an integral part of
many networks that do not need to see responses.

IP-Spoofing Facts

IP protocol is inherently weak
Makes no assumption about sender/recipient
Nodes on path do not check sender’s identity
There is no way to completely eliminate IP spoofing
Can only reduce the possibility of attack

Applications

Asymmetric routing (Splitting routing)

SAT DSL

NAT

IP Masquerade

ADVANTAGES


Multiple Servers :
Sometimes you want to change where packets heading into your network will go. Frequently this is because you have only one IP address, but you want people to be able to get into the boxes behind the one with the `real' IP address.


Transparent Proxying :

Sometimes you want to pretend that each packet which passes through your Linux box is destined for a program on the Linux box itself. This is used to make transparent proxies: a proxy is a program which stands between your network and the outside world, shuffling communication between the two. The transparent part is because your network won't even know it's talking to a proxy, unless of course, the proxy doesn't work.

DISADVANTAGES

Blind to Replies :
A drawback to ip source address spoofing is that reply packet will go back to the spoofed ip address rather than to the attacker. This is fine for many type of attack packet. However in the scanning attack as we will see next the attacker may need to see replies .in such cases ,the attacker can not use ip address spoofing .

Serial attack platforms :
However, the attacker can still maintain anonymity by taking over a chain of attack hosts. The attacker attacks the target victim using a point host-the last host in the attack chain .Even if authorities learn the point host’s identity .They might not be able to track the attack through the chain of attack hosts all the way back to the attackers base host.

CONCLUSION

IP spoofing attacks is unavoidable.

Understanding how and why spoofing attacks are used, combined with a few simple prevention methods, can help protect your network from these malicious cloaking and cracking techniques.



Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: ieee format for ip spoofing, ip spoofing 2012 pdf, spoofing means, report on web spoofing, seminar report web spoofing, interline billinginterline 955, gps spoofing seminar report,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
ip spoofing with ppt - by projectsofme - 24-09-2010, 09:22 AM
RE: ip spoofing seminars report - by seminar surveyer - 12-01-2011, 11:12 AM
RE: ip spoofing PPT - by seminar addict - 26-01-2012, 02:33 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,024 24-11-2018, 01:19 AM
Last Post:
  web spoofing full report computer science technology 9 11,114 26-03-2014, 06:29 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,832 08-10-2013, 04:32 PM
Last Post: Guest
  tele immersion seminars report computer science technology 9 14,906 20-12-2012, 11:20 AM
Last Post: seminar details
  INTRODUCTION OF IP SPOOFING computer girl 0 1,046 08-06-2012, 12:01 PM
Last Post: computer girl
  computer science seminars topics computer science crazy 1 10,109 16-03-2012, 10:38 AM
Last Post: seminar paper
  GSM Security And Encryption (download seminars report) Computer Science Clay 14 14,525 07-03-2012, 07:35 PM
Last Post: kushi.8
  Controlling IP Spoofing Through Inter-Domain Packet Filters seminar surveyer 1 2,511 29-02-2012, 12:51 PM
Last Post: seminar paper
  wireless lan security seminars report computer science technology 8 11,893 24-02-2012, 12:21 PM
Last Post: seminar paper
  wi-max seminars report tanaya padhee 9 10,665 23-02-2012, 10:58 AM
Last Post: seminar paper

Forum Jump: