SlideShare a Scribd company logo
44 SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59
Introduction
Criminals have long employed the tactic of
masking their true identity, fromdisguises to aliases to
caller-id blocking. It should come as no surprise then,
thatcriminalswhoconducttheirnefariousactivitieson
networks and computers should employ such tech-
niques. IP spoofing is one of the most common forms
ofon-linecamouflage.InIPspoofing,anattackergains
unauthorized access to a computer or a network by
making it appear that a malicious message has come
from a trusted machine by "spoofing" the IP address
ofthat machine. In the subsequent pages ofthisreport,
we will examine the concepts of IP spoofing: why it is
possible, how it works, what it is used for and how to
defend against it.
TCP/IPProtocolSuite
IP SpoofingexploitstheflawsinTCP/IP pro-
tocol suite. In order to completely understand how
these attacks can take place, one must examine the
structure of the TCP/IP protocol suite. Abasic under-
standing of these headers and network exchanges is
crucial to the process.
3.1InternetProtocol-IP
The Internet Protocol (or IP as it generally
known),isthenetworklayeroftheInternet.IPprovides
a connection-less service. The job of IP is to route and
send a packet to the packet's destination. IP provides
no guarantee whatsoever, for the packets it tries to
deliver. The IP packets are usually termed datagrams.
The datagrams go through a series of routers before
they reach the destination. At each node that the
datagram passes through, the node determines the
next hop for the datagram and routes it to the next hop.
Since the network is dynamic, it is possible that two
Research Paper
December , 2013
IPSpoofing
* Yash Batra
IP spoofing is a method of attacking a network in order to gain unauthorized access. The attack is based on the fact that
Internet communication between distant computers is routinely handled by routers which find the best route by examining
the destination address, but generally ignore the origination address. The origination address is only used by the destination
machine when it responds back to the source. In a spoofing attack, the intruder sends messages to a computer indicating
that the message has come from a trusted system. To be successful, the intruder must first determine the IP address of a trusted
system, and then modify the packet headers to that it appears that the packets are coming from trusted user. In essence, the
attacker is fooling (spoofing) the distant computer into believing that they are a legitimate member of the network. The goal
of the attack is to establish a connection that will allow the attacker to gain root access to the host, allowing the creation
of a backdoor entry path into the target system.
A B S T R A C T
datagramsfromthesame sourcetake differentpaths to
make it to the destination. Since the network has vari-
able delays,it is notguaranteed that the datagrams will
be received in sequence. IP only tries for a best-effort
delivery.Itdoesnottakecareoflostpackets;thisisleft
to the higher layer protocols. There is no state main-
tained between two datagrams; in other words, IP is
connection-less
3.2TransmissionControlProtocol-TCP
IP can be thought of as a routing wrapper for layer 4
(transport), which contains the Transmission Control
Protocol(TCP).UnlikeIP,TCPusesaconnection-ori-
enteddesign.ThismeansthattheparticipantsinaTCP
session must first build a connection - via the 3-way
handshake (SYN-SYN/ACK-ACK) - then update one
another on progress - via sequences and
acknowledgements.This"conversation",ensuresdata
reliability, since the sender receives an OK from the
recipient after each packet exchange.
3.3 ConsequencesoftheTCP/IPDesign
Nowthat we have an overviewof the TCP/IP
formats, let's examine the consequences. Obviously,
it'sveryeasytomaskasourceaddressbymanipulating
an IP header. This technique is used for obvious rea-
sons and is employed in several of the attacks dis-
cussed below. Another consequence, specific to TCP,
is sequence number prediction, which can lead to ses-
sion hijacking or host impersonating. This method
builds on IP spoofing, since a session, albeit a false
one, is built. We will examine the ramifications of this
in the attacks discussed below.
SpoofingAttacks
There are a few variations on the types of
attacksthatsuccessfullyemployIPspoofing.Although
*B.Tec(CSE)
45SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59
some are relatively dated, others are very pertinent to
current security concerns. IP-spoofing consists of
several steps, which I will briefly outline here, then
explain in detail. First, the targethost is chosen. Next,
a pattern of trust is discovered, along with a trusted
host. The trusted host is then disabled, and the target's
TCP sequence numbers are sampled. The trusted host
is impersonated, the sequence numbers guessed, and
a connection attempt is made to a service that only
requires address-based authentication. If successful,
the attacker executes a simple command to leave a
backdoor.
4.1MitnickAttack
4.2 Session Hijack
4.3 DosAttack
4.4Non-BlindSpoofing
4.5BlindSpoofing
MechanismOfTheAttack
They are supposed to go the trusted host. As
farasthenetworklayerisconcerned,thisiswherethey
originallycamefrom,andthisiswhereresponsesshould
go. Ofcourse oncethedatagrams arerouted there,and
theinformationisdemultiplexedup theprotocolstack,
and reachesTCP,itisdiscarded(thetrustedhost'sTCP
cannot respond-- see below). So the attacker has to be
smart and *know* what was sent, and *know* what
reponse the server is looking for. The attacker cannot
see what the target host sends, but she can *predict*
what it will send; that coupled with the knowledge of
what it *will* send, allows the attacker to work around
this blindness
infacttrustsomebody. Ifitdidn't,theattackwould end
here). Figuring out who a host trusts may or may not
beeasy. A'showmount-e'mayshowwherefilesystems
are exported, and rpcinfo can give out valuable infor-
mation as well. If enough background information is
known about the host, it should not be too difficult. If
allelse fails,trying neighboringIP addressesinabrute
force effort may be a viable option.
MethodsToPreventIpSpoofingAttack
6.1Packetfiltering
6.2 Filtering at the Router
6.3 Encryption and Authentication
6.4 Cryptographic Methods
ApplicationsOfIpSpoofing
7.1Asymmetricrouting(Splitting routing)
Asymmetric routing means traffic goes over
different interfaces for directions in and out. In other
words, asymmetric routing is when the response to a
packetfollowsadifferentpathfromonehosttoanother
thantheoriginalpacketdid.Themorecorrectandmore
general answer is, for any source IP address 'A' and
destination 'B', the path followed by any packet (re-
quest or response) from 'A' to 'B' is different than the
path taken by a packet from 'B' to 'A'.
After a target is chosen the attacker must
determine the patterns of trust (for the sake of argu-
ment, we are going to assume the target host *does*
Fig.ValidSourceIPAddress
7.2 Sat Dsl
SatelliteDSL(SATDSL)makesuseofasymmetricrout-
ing.
Fig. Satellite DSL
The advantage of a satellite network is to
provide high bandwidth services independent of the
46 SHODH, SAMIKSHA AUR MULYANKAN
International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59
userslocationoverawidegeographicalarea.Asatellite
network consists of two types of stations: feeds and
receivers.Everyreceiverhasasatellitedishconnected
toauserstation.Theuserstationhasanextrainterface,
DSL modem connected to the ISP, this is called return
channel. All requests to Internet are sent via DSL
connection, and responses from Internet should be
routed by a feed on the satellite network. After the
informationis sentfromthe feed to asatellite,it willbe
broadcasttoallthereceiversthatbelongto thesatellite
coverage. Installing feeds in strategic positions over
the Internet will create shorter paths and higher band-
width provided by the satellite network. The user host
has therefore two IP addresses, one for the satellite
subnetwork and the other for the regular connection
subnetwork (return channel).
ThetrafficpathofsatelliteDSLis:
1. Following the Journey of a Spoofed Packet http://www.scs.carleton.ca/~dlwhyte/whytepapers/ipspoof.htm
2. NAT and Networks http://www.suse.de/~mha/linux-ip-nat/diplom/node4.html
3. Asymmetric routing - Jani Lakkakorpi http://keskus.hut.fi/tutkimus/ipana/paperit/QoSR/S130-QoSR-asymmetric.pdf
4. TCP/IP protocol suite - Thomas Toth
R E F E R E N C E
If one of these links were to do NAT, then they would
alter the source or destinations of the packet as it
passes through. Usually the link doing NAT will re-
member how it mangled a packet, and when a reply
packet passes through the other way, it will do the
reverse mangling on that reply packet, so everything
works.
Advantages
Freedom of spoofing. The attacker is not
bounded by a specific range of IPs. No wasted or
unneeded initiated packets. The attacker sends one
TCP/UDPpacket per port.No tracing of the original
scanner. Detection of the scanning machine
isimpossible at the IP layer.
Disadvantages
Noreplies.Therewillbenoreplypacketsarrivingatthe
scanning machine. No results. Since replies are not
received, the attacker won't know port status.
Conclusion
IP spoofing is less of a threat today due to the
patches to the Unix Operating system and the wide-
spread use of random sequence numbering. Many
securityexpertsare predictinga shift fromIP spoofing
attacks to application-related spoofing in which hack-
ers can exploit a weakness in a particular service to
send and receive information under false identities.As
Security professionals, we must remain current with
the Operating Systems that we use in our day to day
activities. A steady stream of changes and new chal-
lenges is assured as the hacker community continues
to seek out vulnerabilities and weaknesses in our sys-
tems and our networks.
Fig.TrafficPath of Satellite DSL
7.3NAT
NATisnetworkaddresstranslation.Normally,
packets on a network travel from their source to their
destinationthroughmanydifferentlinks.Noneofthese
links really alter your packet, they just send it onward.

More Related Content

What's hot

ip spoofing
ip spoofingip spoofing
ip spoofing
mohan babu
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
IAEME Publication
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
Anushakp9
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
deepakmarndi
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
Akmal Hussain
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacksApijay Kumar
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
Himanshu Chaurishiya
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
Dhrumil Shah
 
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHMAN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
IJNSA Journal
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
ibnu mubarok
 
Spoofing
SpoofingSpoofing
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
arpit.arp
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
charankumarreddy muddarla
 
Ip trace ppt
Ip trace pptIp trace ppt
Ip trace ppt
deepakmarndi
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijripublishers Ijri
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
priya_kp03
 

What's hot (20)

ip spoofing
ip spoofingip spoofing
ip spoofing
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Ip spoofing ppt
Ip spoofing pptIp spoofing ppt
Ip spoofing ppt
 
Ip traceback seminar full report
Ip traceback seminar full reportIp traceback seminar full report
Ip traceback seminar full report
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Himanshupptx
HimanshupptxHimanshupptx
Himanshupptx
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHMAN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
AN EFFICIENT IP TRACEBACK THROUGH PACKET MARKING ALGORITHM
 
I P S P O O F I N G
I P  S P O O F I N GI P  S P O O F I N G
I P S P O O F I N G
 
Overview of IP traceback mechanism
Overview of IP traceback mechanismOverview of IP traceback mechanism
Overview of IP traceback mechanism
 
Spoofing
SpoofingSpoofing
Spoofing
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Sudheer tech seminor
Sudheer tech seminorSudheer tech seminor
Sudheer tech seminor
 
Ipspoofing
IpspoofingIpspoofing
Ipspoofing
 
Ip trace ppt
Ip trace pptIp trace ppt
Ip trace ppt
 
ip spoofing
ip spoofingip spoofing
ip spoofing
 
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
Ijricit 01-001 pipt - path backscatter mechanism for unveiling real location ...
 
My ppt..priya
My ppt..priyaMy ppt..priya
My ppt..priya
 
Presentation1
Presentation1Presentation1
Presentation1
 

Viewers also liked

Journal impact factor 2012 (1)
Journal impact factor 2012 (1)Journal impact factor 2012 (1)
Journal impact factor 2012 (1)
Sundar Sivam
 

Viewers also liked (11)

INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Why You Should Not Use The Journal Impact Factor To Evaluate Research
Why You Should Not Use The Journal Impact Factor To Evaluate ResearchWhy You Should Not Use The Journal Impact Factor To Evaluate Research
Why You Should Not Use The Journal Impact Factor To Evaluate Research
 
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPERGoel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
Goel-INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
Journal impact factor 2012 (1)
Journal impact factor 2012 (1)Journal impact factor 2012 (1)
Journal impact factor 2012 (1)
 

Similar to INTERNATIONAL INDEXED REFEREED RESEARCH PAPER

Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Pvrtechnologies Nellore
 
A017510102
A017510102A017510102
A017510102
IOSR Journals
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
Bhavya Chawla
 
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
paperpublications3
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsjpstudcorner
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
IOSR Journals
 
D017131318
D017131318D017131318
D017131318
IOSR Journals
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Editor IJCATR
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Mumbai Academisc
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
ijcses
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
Wail Hassan
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Olli-Pekka Niemi
 
A Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos AttackA Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos Attack
theijes
 
trackingSpoofedIp.pptx
trackingSpoofedIp.pptxtrackingSpoofedIp.pptx
trackingSpoofedIp.pptx
BincySam2
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
nkrafacyberclub
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
ClaraZara1
 

Similar to INTERNATIONAL INDEXED REFEREED RESEARCH PAPER (20)

M dgx mde0mdm=
M dgx mde0mdm=M dgx mde0mdm=
M dgx mde0mdm=
 
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...Passive ip traceback disclosing the locations of ip spoofers from path backsc...
Passive ip traceback disclosing the locations of ip spoofers from path backsc...
 
A017510102
A017510102A017510102
A017510102
 
Ethical Hacking - sniffing
Ethical Hacking - sniffingEthical Hacking - sniffing
Ethical Hacking - sniffing
 
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMPREVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
REVEALING THE LOCATIONS OF IP SPOOFERS FROM ICMP
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Passive ip traceback disclosing the locations
Passive ip traceback disclosing the locationsPassive ip traceback disclosing the locations
Passive ip traceback disclosing the locations
 
Security Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration NetworksSecurity Issues in Next Generation IP and Migration Networks
Security Issues in Next Generation IP and Migration Networks
 
D017131318
D017131318D017131318
D017131318
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)Controlling ip spoofing through inter domain packet filters(synopsis)
Controlling ip spoofing through inter domain packet filters(synopsis)
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 
An Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet SniffingAn Approach to Detect Packets Using Packet Sniffing
An Approach to Detect Packets Using Packet Sniffing
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Module 10 (session hijacking)
Module 10 (session hijacking)Module 10 (session hijacking)
Module 10 (session hijacking)
 
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wpUs 13-opi-evading-deep-inspection-for-fun-and-shell-wp
Us 13-opi-evading-deep-inspection-for-fun-and-shell-wp
 
A Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos AttackA Trusted Approach Towards DDos Attack
A Trusted Approach Towards DDos Attack
 
trackingSpoofedIp.pptx
trackingSpoofedIp.pptxtrackingSpoofedIp.pptx
trackingSpoofedIp.pptx
 
Cyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_ContestCyber_Threat_Intelligent_Cyber_Operation_Contest
Cyber_Threat_Intelligent_Cyber_Operation_Contest
 
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
The Fight against IP Spoofing Attacks: Network Ingress Filtering Versus First...
 

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL
 

More from INTERNATIONAL INDEXED,REFERRED,MULTILINGUAL,INTERDISCIPLINARY, MONTHLY RESEARCH JOURNAL (20)

Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
Effect of Pesticide 'Companion' on the Nutritional Composition and Certain Me...
 
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...The Geo-Strategic Significance of Afghanistan :  From The Past to The Present...
The Geo-Strategic Significance of Afghanistan : From The Past to The Present...
 
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
Acculturation And Diasporic Influence In Uma Parmeswaran's "What Was Always H...
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPERINTERNATIONAL INDEXED REFEREED RESEARCH PAPER
INTERNATIONAL INDEXED REFEREED RESEARCH PAPER
 

Recently uploaded

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 

Recently uploaded (20)

Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 

INTERNATIONAL INDEXED REFEREED RESEARCH PAPER

  • 1. 44 SHODH, SAMIKSHA AUR MULYANKAN International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59 Introduction Criminals have long employed the tactic of masking their true identity, fromdisguises to aliases to caller-id blocking. It should come as no surprise then, thatcriminalswhoconducttheirnefariousactivitieson networks and computers should employ such tech- niques. IP spoofing is one of the most common forms ofon-linecamouflage.InIPspoofing,anattackergains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by "spoofing" the IP address ofthat machine. In the subsequent pages ofthisreport, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it. TCP/IPProtocolSuite IP SpoofingexploitstheflawsinTCP/IP pro- tocol suite. In order to completely understand how these attacks can take place, one must examine the structure of the TCP/IP protocol suite. Abasic under- standing of these headers and network exchanges is crucial to the process. 3.1InternetProtocol-IP The Internet Protocol (or IP as it generally known),isthenetworklayeroftheInternet.IPprovides a connection-less service. The job of IP is to route and send a packet to the packet's destination. IP provides no guarantee whatsoever, for the packets it tries to deliver. The IP packets are usually termed datagrams. The datagrams go through a series of routers before they reach the destination. At each node that the datagram passes through, the node determines the next hop for the datagram and routes it to the next hop. Since the network is dynamic, it is possible that two Research Paper December , 2013 IPSpoofing * Yash Batra IP spoofing is a method of attacking a network in order to gain unauthorized access. The attack is based on the fact that Internet communication between distant computers is routinely handled by routers which find the best route by examining the destination address, but generally ignore the origination address. The origination address is only used by the destination machine when it responds back to the source. In a spoofing attack, the intruder sends messages to a computer indicating that the message has come from a trusted system. To be successful, the intruder must first determine the IP address of a trusted system, and then modify the packet headers to that it appears that the packets are coming from trusted user. In essence, the attacker is fooling (spoofing) the distant computer into believing that they are a legitimate member of the network. The goal of the attack is to establish a connection that will allow the attacker to gain root access to the host, allowing the creation of a backdoor entry path into the target system. A B S T R A C T datagramsfromthesame sourcetake differentpaths to make it to the destination. Since the network has vari- able delays,it is notguaranteed that the datagrams will be received in sequence. IP only tries for a best-effort delivery.Itdoesnottakecareoflostpackets;thisisleft to the higher layer protocols. There is no state main- tained between two datagrams; in other words, IP is connection-less 3.2TransmissionControlProtocol-TCP IP can be thought of as a routing wrapper for layer 4 (transport), which contains the Transmission Control Protocol(TCP).UnlikeIP,TCPusesaconnection-ori- enteddesign.ThismeansthattheparticipantsinaTCP session must first build a connection - via the 3-way handshake (SYN-SYN/ACK-ACK) - then update one another on progress - via sequences and acknowledgements.This"conversation",ensuresdata reliability, since the sender receives an OK from the recipient after each packet exchange. 3.3 ConsequencesoftheTCP/IPDesign Nowthat we have an overviewof the TCP/IP formats, let's examine the consequences. Obviously, it'sveryeasytomaskasourceaddressbymanipulating an IP header. This technique is used for obvious rea- sons and is employed in several of the attacks dis- cussed below. Another consequence, specific to TCP, is sequence number prediction, which can lead to ses- sion hijacking or host impersonating. This method builds on IP spoofing, since a session, albeit a false one, is built. We will examine the ramifications of this in the attacks discussed below. SpoofingAttacks There are a few variations on the types of attacksthatsuccessfullyemployIPspoofing.Although *B.Tec(CSE)
  • 2. 45SHODH, SAMIKSHA AUR MULYANKAN International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59 some are relatively dated, others are very pertinent to current security concerns. IP-spoofing consists of several steps, which I will briefly outline here, then explain in detail. First, the targethost is chosen. Next, a pattern of trust is discovered, along with a trusted host. The trusted host is then disabled, and the target's TCP sequence numbers are sampled. The trusted host is impersonated, the sequence numbers guessed, and a connection attempt is made to a service that only requires address-based authentication. If successful, the attacker executes a simple command to leave a backdoor. 4.1MitnickAttack 4.2 Session Hijack 4.3 DosAttack 4.4Non-BlindSpoofing 4.5BlindSpoofing MechanismOfTheAttack They are supposed to go the trusted host. As farasthenetworklayerisconcerned,thisiswherethey originallycamefrom,andthisiswhereresponsesshould go. Ofcourse oncethedatagrams arerouted there,and theinformationisdemultiplexedup theprotocolstack, and reachesTCP,itisdiscarded(thetrustedhost'sTCP cannot respond-- see below). So the attacker has to be smart and *know* what was sent, and *know* what reponse the server is looking for. The attacker cannot see what the target host sends, but she can *predict* what it will send; that coupled with the knowledge of what it *will* send, allows the attacker to work around this blindness infacttrustsomebody. Ifitdidn't,theattackwould end here). Figuring out who a host trusts may or may not beeasy. A'showmount-e'mayshowwherefilesystems are exported, and rpcinfo can give out valuable infor- mation as well. If enough background information is known about the host, it should not be too difficult. If allelse fails,trying neighboringIP addressesinabrute force effort may be a viable option. MethodsToPreventIpSpoofingAttack 6.1Packetfiltering 6.2 Filtering at the Router 6.3 Encryption and Authentication 6.4 Cryptographic Methods ApplicationsOfIpSpoofing 7.1Asymmetricrouting(Splitting routing) Asymmetric routing means traffic goes over different interfaces for directions in and out. In other words, asymmetric routing is when the response to a packetfollowsadifferentpathfromonehosttoanother thantheoriginalpacketdid.Themorecorrectandmore general answer is, for any source IP address 'A' and destination 'B', the path followed by any packet (re- quest or response) from 'A' to 'B' is different than the path taken by a packet from 'B' to 'A'. After a target is chosen the attacker must determine the patterns of trust (for the sake of argu- ment, we are going to assume the target host *does* Fig.ValidSourceIPAddress 7.2 Sat Dsl SatelliteDSL(SATDSL)makesuseofasymmetricrout- ing. Fig. Satellite DSL The advantage of a satellite network is to provide high bandwidth services independent of the
  • 3. 46 SHODH, SAMIKSHA AUR MULYANKAN International Indexed & Refereed Research Journal, ISSN 0974-2832,(Print) E- ISSN-2320-5474, December,2013, VOL-V * ISSUE- 59 userslocationoverawidegeographicalarea.Asatellite network consists of two types of stations: feeds and receivers.Everyreceiverhasasatellitedishconnected toauserstation.Theuserstationhasanextrainterface, DSL modem connected to the ISP, this is called return channel. All requests to Internet are sent via DSL connection, and responses from Internet should be routed by a feed on the satellite network. After the informationis sentfromthe feed to asatellite,it willbe broadcasttoallthereceiversthatbelongto thesatellite coverage. Installing feeds in strategic positions over the Internet will create shorter paths and higher band- width provided by the satellite network. The user host has therefore two IP addresses, one for the satellite subnetwork and the other for the regular connection subnetwork (return channel). ThetrafficpathofsatelliteDSLis: 1. Following the Journey of a Spoofed Packet http://www.scs.carleton.ca/~dlwhyte/whytepapers/ipspoof.htm 2. NAT and Networks http://www.suse.de/~mha/linux-ip-nat/diplom/node4.html 3. Asymmetric routing - Jani Lakkakorpi http://keskus.hut.fi/tutkimus/ipana/paperit/QoSR/S130-QoSR-asymmetric.pdf 4. TCP/IP protocol suite - Thomas Toth R E F E R E N C E If one of these links were to do NAT, then they would alter the source or destinations of the packet as it passes through. Usually the link doing NAT will re- member how it mangled a packet, and when a reply packet passes through the other way, it will do the reverse mangling on that reply packet, so everything works. Advantages Freedom of spoofing. The attacker is not bounded by a specific range of IPs. No wasted or unneeded initiated packets. The attacker sends one TCP/UDPpacket per port.No tracing of the original scanner. Detection of the scanning machine isimpossible at the IP layer. Disadvantages Noreplies.Therewillbenoreplypacketsarrivingatthe scanning machine. No results. Since replies are not received, the attacker won't know port status. Conclusion IP spoofing is less of a threat today due to the patches to the Unix Operating system and the wide- spread use of random sequence numbering. Many securityexpertsare predictinga shift fromIP spoofing attacks to application-related spoofing in which hack- ers can exploit a weakness in a particular service to send and receive information under false identities.As Security professionals, we must remain current with the Operating Systems that we use in our day to day activities. A steady stream of changes and new chal- lenges is assured as the hacker community continues to seek out vulnerabilities and weaknesses in our sys- tems and our networks. Fig.TrafficPath of Satellite DSL 7.3NAT NATisnetworkaddresstranslation.Normally, packets on a network travel from their source to their destinationthroughmanydifferentlinks.Noneofthese links really alter your packet, they just send it onward.