SlideShare a Scribd company logo
1 of 17
Topic :
IP Spoofing
Present By :- Divyesh Solanki
Content
1.Introduction.
2.What is ip spoofing.
3.What is ip address spoofing.
4.Types of ip spoofing.
5.How ip spoofing works.
6.How to detect ip spoofing.
7. how to protect against spoofing.
Introduction
➔ IP (Internet Protocol) spoofing is a technique used in computer
networking to disguise the true source of network traffic by altering
the source IP address of a packet.
➔ It is a situation in which one person or program successfully
masquerades as another by falsifying information/data and thereby
gaining an illegitimate advantage.
Introduction
➔ This technique can be used to launch various types of cyber attacks,
such as denial-of-service (dos) attacks, man-in-the-middle (mitm)
attacks, and session hijacking attacks.
➔ This can be done using various tools and techniques, such as
specialized software, scripting languages, or by manually crafting
packets using low-level network programming.
❖ Spoofing is a type of cybercrime, the method of which is to impersonate another
computer or network as a normal user in order to convince the user about the
credibility of the source of information.
❖ Hackers use this method as a form of hacking an operating system to steal
sensitive data, misuse captured computers, launch attacks, and more. In fact,
IP spoofing was originally one of the methods of DDoS attacks.
What is IP Address Spoofing?
Types of IP Spoofing?
● IP spoofing: Attacker uses IP address of
another computer to acquire
information or gain access from
another network.
● Email spoofing: Attacker sends email but
makes it appear to come from someone
else(reliable email).
● Web spoofing: Attacker tricks web browser
into communicating with a
IP Spoofing Algorithm
● Any attack works according to some scheme,
which it develops its identical structure of
actions. For example, above, we consider the IP
spoofing algorithm:
● All data that is transmitted between computer
networks is divided into packets. Does each
package have its IP headers, which include the
source IP address and other information.
How IP Spoofing Works ?
● What’s a cybercriminal doing with all this? It
starts to change the IP addresses it compiles so
that the recipient will think the sending is coming
from a reliable source.
● These operations take place on a network level,
so there are no signs on the surface. The spoofing
process falsifies the sender’s address to convince
the remote system that it receives the address
from an objective source.
How IP Spoofing Works ?
How to detect ip spoofing ?
1. It is almost impossible to notice a submenu IP address because the submenu
occurs on a network level and connections often look like legitimate requests.
So there are no external signs.
2. But not all are unsuccessful! Network monitoring tools make it possible to do
traffic analysis at endpoints.
3. It would also be appropriate for such attacks to do packet filtering; what would it
do? These package systems located in the firewall and routers find a discrepancy
between the required IP address and the IP addresses of the packets specified in the
ACL (access control list), so it is possible to find an attacker on the network.
How To Detect IP Spoofing ?
How to Prevent Against IP Spoofing ?
How to Prevent Against IP Spoofing ?
● Turn your spam filter.
● Check for poor grammar.
● Hover over the URL before clicking.
● Confirm information with the source.
● Set up two-factor authentication.
● Download cyber-security software.
.
● Click on unfamiliar download
● Answer call or email from
unrecognized sender
● Give out your personal information to
unfamiliar source
● Use the same password across
multiple logins
Any
Question?
References
● https://www.cloudflare.com/learning/ddos/glossary/ip-spoofing/
● https://www.geeksforgeeks.org/ip-spoofing/
● https://www.techtarget.com/searchsecurity/definition/IP-spoofing/
Thank You ..!
Divyesh N. Solanki

More Related Content

Similar to IP Spoofing: Techniques, Detection & Prevention

Spoofing
SpoofingSpoofing
SpoofingSanjeev
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hackingjignesh khunt
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita NandyIpshitaNandy
 
Impacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concernImpacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concerndeorwine infotech
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKScscpconf
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxSuhailShaik16
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Mumbai Academisc
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & AttacksNetwax Lab
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTDHRUV562167
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingsxkkjbzq2k
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 

Similar to IP Spoofing: Techniques, Detection & Prevention (20)

Spoofing
SpoofingSpoofing
Spoofing
 
Presentation1
Presentation1Presentation1
Presentation1
 
Spoofing
SpoofingSpoofing
Spoofing
 
Web spoofing hacking
Web spoofing hackingWeb spoofing hacking
Web spoofing hacking
 
ip spoofing by Ipshita Nandy
 ip spoofing by Ipshita Nandy ip spoofing by Ipshita Nandy
ip spoofing by Ipshita Nandy
 
Impacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concernImpacts of spoofing- why it’s a serious cybersecurity concern
Impacts of spoofing- why it’s a serious cybersecurity concern
 
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKSEFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
EFFICIENT DEFENSE SYSTEM FOR IP SPOOFING IN NETWORKS
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Spamming, spoofing, Dos&DDos attack
Spamming, spoofing, Dos&DDos attackSpamming, spoofing, Dos&DDos attack
Spamming, spoofing, Dos&DDos attack
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptxINTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
INTERNSHIPREVIEW-ISHAQ (1) [Recovered].pptx
 
Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)Efficient packet marking for large scale ip trace back(synopsis)
Efficient packet marking for large scale ip trace back(synopsis)
 
Anonymizers
AnonymizersAnonymizers
Anonymizers
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
hacking
hackinghacking
hacking
 
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECTHACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
HACKING DESCRIBE IN DETAIL FOR UNIVERSITY PROJECT
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Ethical hacking is a based on computer hacking
Ethical hacking is a based on computer hackingEthical hacking is a based on computer hacking
Ethical hacking is a based on computer hacking
 
A017510102
A017510102A017510102
A017510102
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 

IP Spoofing: Techniques, Detection & Prevention

  • 1. Topic : IP Spoofing Present By :- Divyesh Solanki
  • 2. Content 1.Introduction. 2.What is ip spoofing. 3.What is ip address spoofing. 4.Types of ip spoofing. 5.How ip spoofing works. 6.How to detect ip spoofing. 7. how to protect against spoofing.
  • 3. Introduction ➔ IP (Internet Protocol) spoofing is a technique used in computer networking to disguise the true source of network traffic by altering the source IP address of a packet. ➔ It is a situation in which one person or program successfully masquerades as another by falsifying information/data and thereby gaining an illegitimate advantage.
  • 4. Introduction ➔ This technique can be used to launch various types of cyber attacks, such as denial-of-service (dos) attacks, man-in-the-middle (mitm) attacks, and session hijacking attacks. ➔ This can be done using various tools and techniques, such as specialized software, scripting languages, or by manually crafting packets using low-level network programming.
  • 5. ❖ Spoofing is a type of cybercrime, the method of which is to impersonate another computer or network as a normal user in order to convince the user about the credibility of the source of information. ❖ Hackers use this method as a form of hacking an operating system to steal sensitive data, misuse captured computers, launch attacks, and more. In fact, IP spoofing was originally one of the methods of DDoS attacks.
  • 6. What is IP Address Spoofing?
  • 7. Types of IP Spoofing? ● IP spoofing: Attacker uses IP address of another computer to acquire information or gain access from another network. ● Email spoofing: Attacker sends email but makes it appear to come from someone else(reliable email). ● Web spoofing: Attacker tricks web browser into communicating with a
  • 9. ● Any attack works according to some scheme, which it develops its identical structure of actions. For example, above, we consider the IP spoofing algorithm: ● All data that is transmitted between computer networks is divided into packets. Does each package have its IP headers, which include the source IP address and other information. How IP Spoofing Works ?
  • 10. ● What’s a cybercriminal doing with all this? It starts to change the IP addresses it compiles so that the recipient will think the sending is coming from a reliable source. ● These operations take place on a network level, so there are no signs on the surface. The spoofing process falsifies the sender’s address to convince the remote system that it receives the address from an objective source. How IP Spoofing Works ?
  • 11. How to detect ip spoofing ?
  • 12. 1. It is almost impossible to notice a submenu IP address because the submenu occurs on a network level and connections often look like legitimate requests. So there are no external signs. 2. But not all are unsuccessful! Network monitoring tools make it possible to do traffic analysis at endpoints. 3. It would also be appropriate for such attacks to do packet filtering; what would it do? These package systems located in the firewall and routers find a discrepancy between the required IP address and the IP addresses of the packets specified in the ACL (access control list), so it is possible to find an attacker on the network. How To Detect IP Spoofing ?
  • 13. How to Prevent Against IP Spoofing ?
  • 14. How to Prevent Against IP Spoofing ? ● Turn your spam filter. ● Check for poor grammar. ● Hover over the URL before clicking. ● Confirm information with the source. ● Set up two-factor authentication. ● Download cyber-security software. . ● Click on unfamiliar download ● Answer call or email from unrecognized sender ● Give out your personal information to unfamiliar source ● Use the same password across multiple logins
  • 17. Thank You ..! Divyesh N. Solanki