1. DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
“IP SPOOFING”
SDM INSTITUTE OF TECHNOLOGY
Presented by:
Name: Sharanya B M
USN: 4SU20CS089
2. INTRODUCTION
• IP spoofing is a deceptive technique in computer
networking where an attacker falsifies the source IP
address of packets to disguise their identity or
impersonate another entity
• By manipulating the headers of IP packets, the
attacker can impersonate a trusted entity or device,
potentially gaining unauthorized access to networks,
systems, or services.
2
3. INTRODUCTION
• IP spoofing can be difficult to detect and prevent due
to the decentralized nature of the Internet and the lack
of authentication mechanisms in the IP protocol.
• However we can try to avoid this malicious activities
by taking countermeasures such as packet filtering,
strong authentication and intrusion
3
4. LITERATURE SURVEY
Sl.No Authors/Title Proposed Method Summary
1. Michael Knop,
Caroline
Ressing,
Morious
Mueller
Virtual reality,
augmented reality
and holography in
healthcare
The excerpt discusses the
potential of virtual reality
technologies to enhance
medical care and
highlights the need for
theoretical frameworks to
guide research in this area.
While psychology offers
some theoretical bases,
there's a lack of such
foundations in information
systems research
4
5. Sl. No Author/Title Proposed Method Summary
2. Byeol Kim,
Yue-Hin loke,
Laura Olivieri,
Alex Krieger
Medical image
selection, CorFix
Development,
Design export and
import feature
Virtual reality graft design
software can quickly be
taught to physicians with
no engineering background
or virtual reality
experience with graphical
visualization.
3. Falguiere,
H Herry,
Jean Michel,
LeGruiece
Virtual reality
technology to
provide pre- and
post- operative
environment.
The aim is to review the
highlights of the
contribution of the virtual
reality headset in reducing
the anxiety and pre- and
post- operative pain in
patients having oral
surgery
5
6. Sl. No Authors/Title Proposed Method Summary
4. Mohd Javaid,
Abid Haleem
Applications of
virtual reality
technology in the
medical field.
VR is used effectively for
better surgical technique.
It creates detailed virtual
models of a patient's
anatomy. It helps
physicians to effectively
move around and view
virtual 3D images from
different angles
5. Rumia
Sultanova,
Regina
Sharaeva
The method of
training with
controllerless dive,
using gloves with
feedback.
The training simulator
designed for invasive
operations in VR, which is
based on users interaction
with virtual surgical
instruments and a virtual
patient using controllers
6
8. WORKING
1. Deceptive Origin: IP spoofing involves altering the
source IP address in a packet's header to make it
appear as if it's originating from a trusted source.
2. Crafting the Packet: Attackers use specialized
tools or manual techniques to create packets with
forged source IP addresses.
8
9. 3. Transmission to Target: The spoofed packets are
then sent to the target network or system, exploiting
vulnerabilities or bypassing security measures.
4. Trusted Source Illusion: Because the packets appear
to come from a trusted source, the target may accept
them without suspicion.
9
10. 5. Potential Responses: If the target responds to the
spoofed packets, the responses are sent to the forged
source IP addresses, potentially disrupting network
communications or allowing interception of sensitive
data.
6. Commonly Combined: IP spoofing is often
combined with other attack techniques such as DDoS
attacks, session hijacking, or man-in-the-middle attacks
to achieve specific malicious objectives.
10
11. APPLICATIONS
• Network Testing and Security Assessment
• Bypassing Geolocation Restrictions
• Phishing and Social Engineering
• Research and Network Simulation
• Circumventing Access Restrictions
11
12. CONCLUSION
IP spoofing attacks is unavoidable. IP spoofing involves
falsifying the source IP address in a packet to deceive
the recipient. While it can be used for legitimate
purposes like network testing. Understanding IP
spoofing allows us to strengthen our network defenses
by implementing proactive measures. By recognizing
the potential risks and vulnerabilities, we can take steps
to fortify our systems against malicious activities.
12
13. REFERENCES
[1] Michael Knop, Caroline Ressing, Morious Mueller“Virtual
Reality Technology in Health Care”: Proceeding of 55 Hawaii
international conference on system sciences-2022.
[2] Byeol Kim, Yue-Hin loke, Laura Olivieri, Alex Krieger
“Virtual Reality Cardiac Surgery Planning Software”: JMIR
Cardio 2022 vol. 6 iss. 1.
[3]Falguiere, Clara LeGruiece, H Herry, Jean
Michel“Contribution of Virtual Reality in oral Surgery”.
Elsevier Research - 2021
13
14. REFERENCES
[4] Mohd Javaid, Abid Haleem “Virtual reality applications toward
medical field”: Clinical epidemiology and global health 8 (2020)
pg. no. 600-605.
[5] Rumia Sultanova, Regina Sharaeva “Virtual Reality-Based
Immersive Simulation Mechanics for Invasive Surgery Training”:
IEEE-2019 pg. no. 924-928.
14