SlideShare a Scribd company logo
1 of 15
DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING
“IP SPOOFING”
SDM INSTITUTE OF TECHNOLOGY
Presented by:
Name: Sharanya B M
USN: 4SU20CS089
INTRODUCTION
• IP spoofing is a deceptive technique in computer
networking where an attacker falsifies the source IP
address of packets to disguise their identity or
impersonate another entity
• By manipulating the headers of IP packets, the
attacker can impersonate a trusted entity or device,
potentially gaining unauthorized access to networks,
systems, or services.
2
INTRODUCTION
• IP spoofing can be difficult to detect and prevent due
to the decentralized nature of the Internet and the lack
of authentication mechanisms in the IP protocol.
• However we can try to avoid this malicious activities
by taking countermeasures such as packet filtering,
strong authentication and intrusion
3
LITERATURE SURVEY
Sl.No Authors/Title Proposed Method Summary
1. Michael Knop,
Caroline
Ressing,
Morious
Mueller
Virtual reality,
augmented reality
and holography in
healthcare
The excerpt discusses the
potential of virtual reality
technologies to enhance
medical care and
highlights the need for
theoretical frameworks to
guide research in this area.
While psychology offers
some theoretical bases,
there's a lack of such
foundations in information
systems research
4
Sl. No Author/Title Proposed Method Summary
2. Byeol Kim,
Yue-Hin loke,
Laura Olivieri,
Alex Krieger
Medical image
selection, CorFix
Development,
Design export and
import feature
Virtual reality graft design
software can quickly be
taught to physicians with
no engineering background
or virtual reality
experience with graphical
visualization.
3. Falguiere,
H Herry,
Jean Michel,
LeGruiece
Virtual reality
technology to
provide pre- and
post- operative
environment.
The aim is to review the
highlights of the
contribution of the virtual
reality headset in reducing
the anxiety and pre- and
post- operative pain in
patients having oral
surgery
5
Sl. No Authors/Title Proposed Method Summary
4. Mohd Javaid,
Abid Haleem
Applications of
virtual reality
technology in the
medical field.
VR is used effectively for
better surgical technique.
It creates detailed virtual
models of a patient's
anatomy. It helps
physicians to effectively
move around and view
virtual 3D images from
different angles
5. Rumia
Sultanova,
Regina
Sharaeva
The method of
training with
controllerless dive,
using gloves with
feedback.
The training simulator
designed for invasive
operations in VR, which is
based on users interaction
with virtual surgical
instruments and a virtual
patient using controllers
6
SYSTEM ARCHITECTURE
7
Fig: System Architecture Virtual Surgery.
WORKING
1. Deceptive Origin: IP spoofing involves altering the
source IP address in a packet's header to make it
appear as if it's originating from a trusted source.
2. Crafting the Packet: Attackers use specialized
tools or manual techniques to create packets with
forged source IP addresses.
8
3. Transmission to Target: The spoofed packets are
then sent to the target network or system, exploiting
vulnerabilities or bypassing security measures.
4. Trusted Source Illusion: Because the packets appear
to come from a trusted source, the target may accept
them without suspicion.
9
5. Potential Responses: If the target responds to the
spoofed packets, the responses are sent to the forged
source IP addresses, potentially disrupting network
communications or allowing interception of sensitive
data.
6. Commonly Combined: IP spoofing is often
combined with other attack techniques such as DDoS
attacks, session hijacking, or man-in-the-middle attacks
to achieve specific malicious objectives.
10
APPLICATIONS
• Network Testing and Security Assessment
• Bypassing Geolocation Restrictions
• Phishing and Social Engineering
• Research and Network Simulation
• Circumventing Access Restrictions
11
CONCLUSION
IP spoofing attacks is unavoidable. IP spoofing involves
falsifying the source IP address in a packet to deceive
the recipient. While it can be used for legitimate
purposes like network testing. Understanding IP
spoofing allows us to strengthen our network defenses
by implementing proactive measures. By recognizing
the potential risks and vulnerabilities, we can take steps
to fortify our systems against malicious activities.
12
REFERENCES
[1] Michael Knop, Caroline Ressing, Morious Mueller“Virtual
Reality Technology in Health Care”: Proceeding of 55 Hawaii
international conference on system sciences-2022.
[2] Byeol Kim, Yue-Hin loke, Laura Olivieri, Alex Krieger
“Virtual Reality Cardiac Surgery Planning Software”: JMIR
Cardio 2022 vol. 6 iss. 1.
[3]Falguiere, Clara LeGruiece, H Herry, Jean
Michel“Contribution of Virtual Reality in oral Surgery”.
Elsevier Research - 2021
13
REFERENCES
[4] Mohd Javaid, Abid Haleem “Virtual reality applications toward
medical field”: Clinical epidemiology and global health 8 (2020)
pg. no. 600-605.
[5] Rumia Sultanova, Regina Sharaeva “Virtual Reality-Based
Immersive Simulation Mechanics for Invasive Surgery Training”:
IEEE-2019 pg. no. 924-928.
14
Thank You
15

More Related Content

Similar to Internet Protocol Spoofing Presentation PPT

CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONIJNSA Journal
 
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONIJNSA Journal
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkGauthamSK4
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET Journal
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTIONumme ayesha
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofingijtsrd
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyberJahangirnagar University
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Brianna Johnson
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkIJCNCJournal
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IJCI JOURNAL
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataIRJET Journal
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies IJECEIAES
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jainAnkita Jain
 

Similar to Internet Protocol Spoofing Presentation PPT (20)

CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
 
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATIONCONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
CONTROLLING IP FALSIFYING USING REALISTIC SIMULATION
 
Machine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia NetworkMachine Learning -Based Security Authentication for Wireless Multimedia Network
Machine Learning -Based Security Authentication for Wireless Multimedia Network
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 
PHISHING DETECTION
PHISHING DETECTIONPHISHING DETECTION
PHISHING DETECTION
 
IP Spoofing
IP SpoofingIP Spoofing
IP Spoofing
 
Attack detection and prevention in the cyber
Attack detection and prevention in the cyberAttack detection and prevention in the cyber
Attack detection and prevention in the cyber
 
Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...Information Technology Security Is Vital For The Success...
Information Technology Security Is Vital For The Success...
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Secure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication FrameworkSecure Supervised Learning-Based Smart Home Authentication Framework
Secure Supervised Learning-Based Smart Home Authentication Framework
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
IS THERE A TROJAN! : LITERATURE SURVEY AND CRITICAL EVALUATION OF THE LATEST ...
 
HoneyPots.pptx
HoneyPots.pptxHoneyPots.pptx
HoneyPots.pptx
 
Crypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT DataCrypto Mechanism to Provide Secure to the IOT Data
Crypto Mechanism to Provide Secure to the IOT Data
 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
 

Recently uploaded

如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一hwhqz6r1y
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeralNABLAS株式会社
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdfvyankatesh1
 
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra MalangToko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malangadet6151
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfMichaelSenkow
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一fztigerwe
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...ssuserf63bd7
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"John Sobanski
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxStephen266013
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证ju0dztxtn
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...Amil baba
 
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagra
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat ViagraToko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagra
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagraadet6151
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfgreat91
 
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一w7jl3eyno
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理pyhepag
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理pyhepag
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp onlinebalibahu1313
 

Recently uploaded (20)

如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证成绩单原版一比一
 
社内勉強会資料  Mamba - A new era or ephemeral
社内勉強会資料   Mamba - A new era or ephemeral社内勉強会資料   Mamba - A new era or ephemeral
社内勉強会資料  Mamba - A new era or ephemeral
 
basics of data science with application areas.pdf
basics of data science with application areas.pdfbasics of data science with application areas.pdf
basics of data science with application areas.pdf
 
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra MalangToko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
Toko Jual Viagra Asli Di Malang 081229400522 COD Obat Kuat Viagra Malang
 
Machine Learning for Accident Severity Prediction
Machine Learning for Accident Severity PredictionMachine Learning for Accident Severity Prediction
Machine Learning for Accident Severity Prediction
 
AI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdfAI Imagen for data-storytelling Infographics.pdf
AI Imagen for data-storytelling Infographics.pdf
 
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
如何办理哥伦比亚大学毕业证(Columbia毕业证)成绩单原版一比一
 
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
Data Visualization Exploring and Explaining with Data 1st Edition by Camm sol...
 
Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"Aggregations - The Elasticsearch "GROUP BY"
Aggregations - The Elasticsearch "GROUP BY"
 
Pre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptxPre-ProductionImproveddsfjgndflghtgg.pptx
Pre-ProductionImproveddsfjgndflghtgg.pptx
 
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
如何办理英国卡迪夫大学毕业证(Cardiff毕业证书)成绩单留信学历认证
 
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
NO1 Best Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialist I...
 
123.docx. .
123.docx.                                 .123.docx.                                 .
123.docx. .
 
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagra
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat ViagraToko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagra
Toko Jual Viagra Asli Di Salatiga 081229400522 Obat Kuat Viagra
 
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotecAbortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
Abortion pills in Dammam Saudi Arabia// +966572737505 // buy cytotec
 
edited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdfedited gordis ebook sixth edition david d.pdf
edited gordis ebook sixth edition david d.pdf
 
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
如何办理澳洲悉尼大学毕业证(USYD毕业证书)学位证书成绩单原版一比一
 
一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理一比一原版西悉尼大学毕业证成绩单如何办理
一比一原版西悉尼大学毕业证成绩单如何办理
 
一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理一比一原版阿德莱德大学毕业证成绩单如何办理
一比一原版阿德莱德大学毕业证成绩单如何办理
 
Easy and simple project file on mp online
Easy and simple project file on mp onlineEasy and simple project file on mp online
Easy and simple project file on mp online
 

Internet Protocol Spoofing Presentation PPT

  • 1. DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING “IP SPOOFING” SDM INSTITUTE OF TECHNOLOGY Presented by: Name: Sharanya B M USN: 4SU20CS089
  • 2. INTRODUCTION • IP spoofing is a deceptive technique in computer networking where an attacker falsifies the source IP address of packets to disguise their identity or impersonate another entity • By manipulating the headers of IP packets, the attacker can impersonate a trusted entity or device, potentially gaining unauthorized access to networks, systems, or services. 2
  • 3. INTRODUCTION • IP spoofing can be difficult to detect and prevent due to the decentralized nature of the Internet and the lack of authentication mechanisms in the IP protocol. • However we can try to avoid this malicious activities by taking countermeasures such as packet filtering, strong authentication and intrusion 3
  • 4. LITERATURE SURVEY Sl.No Authors/Title Proposed Method Summary 1. Michael Knop, Caroline Ressing, Morious Mueller Virtual reality, augmented reality and holography in healthcare The excerpt discusses the potential of virtual reality technologies to enhance medical care and highlights the need for theoretical frameworks to guide research in this area. While psychology offers some theoretical bases, there's a lack of such foundations in information systems research 4
  • 5. Sl. No Author/Title Proposed Method Summary 2. Byeol Kim, Yue-Hin loke, Laura Olivieri, Alex Krieger Medical image selection, CorFix Development, Design export and import feature Virtual reality graft design software can quickly be taught to physicians with no engineering background or virtual reality experience with graphical visualization. 3. Falguiere, H Herry, Jean Michel, LeGruiece Virtual reality technology to provide pre- and post- operative environment. The aim is to review the highlights of the contribution of the virtual reality headset in reducing the anxiety and pre- and post- operative pain in patients having oral surgery 5
  • 6. Sl. No Authors/Title Proposed Method Summary 4. Mohd Javaid, Abid Haleem Applications of virtual reality technology in the medical field. VR is used effectively for better surgical technique. It creates detailed virtual models of a patient's anatomy. It helps physicians to effectively move around and view virtual 3D images from different angles 5. Rumia Sultanova, Regina Sharaeva The method of training with controllerless dive, using gloves with feedback. The training simulator designed for invasive operations in VR, which is based on users interaction with virtual surgical instruments and a virtual patient using controllers 6
  • 7. SYSTEM ARCHITECTURE 7 Fig: System Architecture Virtual Surgery.
  • 8. WORKING 1. Deceptive Origin: IP spoofing involves altering the source IP address in a packet's header to make it appear as if it's originating from a trusted source. 2. Crafting the Packet: Attackers use specialized tools or manual techniques to create packets with forged source IP addresses. 8
  • 9. 3. Transmission to Target: The spoofed packets are then sent to the target network or system, exploiting vulnerabilities or bypassing security measures. 4. Trusted Source Illusion: Because the packets appear to come from a trusted source, the target may accept them without suspicion. 9
  • 10. 5. Potential Responses: If the target responds to the spoofed packets, the responses are sent to the forged source IP addresses, potentially disrupting network communications or allowing interception of sensitive data. 6. Commonly Combined: IP spoofing is often combined with other attack techniques such as DDoS attacks, session hijacking, or man-in-the-middle attacks to achieve specific malicious objectives. 10
  • 11. APPLICATIONS • Network Testing and Security Assessment • Bypassing Geolocation Restrictions • Phishing and Social Engineering • Research and Network Simulation • Circumventing Access Restrictions 11
  • 12. CONCLUSION IP spoofing attacks is unavoidable. IP spoofing involves falsifying the source IP address in a packet to deceive the recipient. While it can be used for legitimate purposes like network testing. Understanding IP spoofing allows us to strengthen our network defenses by implementing proactive measures. By recognizing the potential risks and vulnerabilities, we can take steps to fortify our systems against malicious activities. 12
  • 13. REFERENCES [1] Michael Knop, Caroline Ressing, Morious Mueller“Virtual Reality Technology in Health Care”: Proceeding of 55 Hawaii international conference on system sciences-2022. [2] Byeol Kim, Yue-Hin loke, Laura Olivieri, Alex Krieger “Virtual Reality Cardiac Surgery Planning Software”: JMIR Cardio 2022 vol. 6 iss. 1. [3]Falguiere, Clara LeGruiece, H Herry, Jean Michel“Contribution of Virtual Reality in oral Surgery”. Elsevier Research - 2021 13
  • 14. REFERENCES [4] Mohd Javaid, Abid Haleem “Virtual reality applications toward medical field”: Clinical epidemiology and global health 8 (2020) pg. no. 600-605. [5] Rumia Sultanova, Regina Sharaeva “Virtual Reality-Based Immersive Simulation Mechanics for Invasive Surgery Training”: IEEE-2019 pg. no. 924-928. 14