IP spoofing involves modifying source IP addresses on IP packets to gain unauthorized access to machines. It is commonly used in denial of service (DoS) and distributed denial of service (DDoS) attacks to overwhelm servers and crash networks by sending a flood of packets without being detected, as the true origin cannot be identified due to the spoofed IP address. While spoofing poses real risks, defenses include packet filtering, firewalls, and cryptographic protocols.
2. Term IP Spoofing Indicates..?
⚫ Spoofing = Hocks / Tricks/Hiding
⚫ IP Spoofing = Hiding of Internet Protocol .
3. What is IP Spoofing..?
⚫ A Technique, used to gain
Unauthorized access to Machines.
⚫ It involves the creation of IP packets
which have a modified source
address.
⚫ IP Spoofing is also called IP Address
Forgery or Host File Hijack.
4. Why IP Spoofing is used..?
⚫ This eliminates the need for the hacker to provide a username and
password to log onto the network.
⚫ These are attacks that relate massive amounts of information being sent to
computers over a network in an attempt to crash the full network.
⚫ The hacker does not get caught because the origin of the messages cannot
be determined due to the bogus IP address.
6. Different Types of IP Spoofing…
⚫Denial of Service Attack(DOS attacks)
⚫Distributed Denial of Service(DDOS attacks)
⚫Man in the Middle Attack
⚫Non-Blind Spoofing
⚫Blind Spoofing
7. Denial-of-service(DOS) Attacks…
⚫ IP Spoofing is always used in DOS attacks.
⚫ DOS Attack is characterized by using a single computer to launch the attack
⚫ DOS attacks typically function by flooding a targeted machine with requests until normal
traffic is unable to be processed, resulting in denial-of-service to addition users.
Types of DOS Attacks:
>> Buffer overflow
>>Flood attacks
8. Distributed Denial-of-Service (DDoS)
Attack…
⚫ DDOS attack is a brute-force attempt to slow down or completely crash a
server
⚫ cut off users from a network resource by overwhelming it with requests for
service by using bot to carry out tasks simultaneously
Types of DDoS attacks🡪
1.volume based
2. Protocol based
3.application layer based
9. Man-in-the-Middle Attack…
⚫ These type is also called as connection hijacking
⚫ In this attack ,a malicious party intercepts a legitimate communication between two hosts to
controls the flow of communication and to eliminate of ter the info sent by one of the original
participants without their knowledge
⚫ In this way, an attacker can fool a victim into disclosing confidential information by “spoofing”
the Identity of the original sender.
10. Botnet…?
Robot + Network = Botnet
• Basically special types of
Trojan Viruses/Malware created
by Bot Master(Criminal)
• Used to breach the security of
several user’s Computers
• After infecting the target,
starts sending flood of request to
that network completely
shutdown the network
11. Anti Spoofing….?
There have some common tools available by which Spoofing can be
reduced🡪
⚫Packet Filtering
⚫Avoid Trust Relationships
⚫Use Spoofing Detection Software
⚫Use Cryptographic Network Protocols
⚫Use Firewall Protection
13. Is IP Spoofing a Real Risk…?
⚫ The April 1989 article entitled:
“Security Problems in the TCP/IP
Protocol Suite” by S.M Bellovin
indentified that IP Spoofing is really a
risk to computer networks.
⚫ New Internet research shows 30,000
Spoofing Attacks/day
⚫ The Statistics of IP Spoofing is
increased exponentially day by day.
14. Conclusion…
⚫IP Spoofing is an old Hacker Trick that continues to evolve.
⚫Will continue to represent a threat as long as each layer
continues to trust each other.