ip spoofing seminars report
#4
Wink 
This article is presented by:Rajkumar

[attachment=4234]

[attachment=4226]


ABSRACT



In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In the subsequent pages of this report, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host. After the occurrence of the infamous Internet Worm, IP spoofing has been identified as a real risk to the Internet and computer network community. Since then, the Internet has suffered a huge number of large-scale attacks. There are many variants of IP spoofing used in an attack. In this paper, we aim to examine the attack methods, and to identify counter-measures. IP spoofing uses the idea of trust relationships. The attack is a "blind" one, meaning the attacker will be assuming the identity of a "trusted" host. From the perspective of the target host, it is simply carrying on a "normal" conversation with a trusted host. In reality, the host is conversing with an attacker who is busy forging IP packets. The data that the target sends back (destined for the trusted host) will go to the trusted host, which the attacker never “sees” them. To prevent disruption from the trusted host, he has to disable the trusted host, using DOS, so that it will not respond to the target‟s replies. The attacker must guess what the target sends and the type of response the server is looking for. By trial communication with the target, the attacker can predict the initial sequence number (ISN) in the target‟s response. He then does not need to actually "see" the response. This allows him to work in the "blind" and manipulate the system.
Undecided

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: advantages of ip spoofing, ping mea, what is spoofing, ip spoofing java coding, grace seminary the, ip spoofing for torrents, web spoofing applications,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
ip spoofing with ppt - by projectsofme - 24-09-2010, 09:22 AM
RE: ip spoofing PPT - by seminar addict - 26-01-2012, 02:33 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,042 24-11-2018, 01:19 AM
Last Post:
  web spoofing full report computer science technology 9 11,114 26-03-2014, 06:29 AM
Last Post: Guest
  Modular Computing seminars report computer science crazy 4 21,840 08-10-2013, 04:32 PM
Last Post: Guest
  tele immersion seminars report computer science technology 9 14,907 20-12-2012, 11:20 AM
Last Post: seminar details
  INTRODUCTION OF IP SPOOFING computer girl 0 1,046 08-06-2012, 12:01 PM
Last Post: computer girl
  computer science seminars topics computer science crazy 1 10,109 16-03-2012, 10:38 AM
Last Post: seminar paper
  GSM Security And Encryption (download seminars report) Computer Science Clay 14 14,528 07-03-2012, 07:35 PM
Last Post: kushi.8
  Controlling IP Spoofing Through Inter-Domain Packet Filters seminar surveyer 1 2,511 29-02-2012, 12:51 PM
Last Post: seminar paper
  wireless lan security seminars report computer science technology 8 11,910 24-02-2012, 12:21 PM
Last Post: seminar paper
  wi-max seminars report tanaya padhee 9 10,665 23-02-2012, 10:58 AM
Last Post: seminar paper

Forum Jump: