Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets

Abstract

In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision. A spoofing attack is like a con game: the attacker sets up a false but convincing world around the victim. The victim does something that would be appropriate if the false world were real. Unfortunately, activities that seem reasonable in the false world may have disastrous effects in the real world. Spoofing attacks are possible in the physical world as well as the electronic one. For example, there have been several incidents in which criminals set up bogus automated-teller machines (ATM), typically in the public areas of shopping malls. The machines would accept ATM cards and ask the person to enter their PIN code. Once the machine had the victim’s PIN, it could either eat the card or “malfunction” and return the card. In either case, the criminals had enough information to copy the victim’s card and use the duplicate. In these attacks, people were fooled by the context they saw: the location of the machines, their size and weight, the way they were decorated, and the appearance of their electronic displays. In this Research we discus spoofing attacks and detection methods of spoofing attacks.

Authors and Affiliations

K. Phalguna Rao| PhD Scholar, Dept of Dept. of Computer Science, Nagpur University, M.S, India, Prof. Ashish B. Sasankar| Head and Associate Professor of the Dept. of Computer Science, G.H. Raisoni Institute of information Technology, Nagpur,M.S, India, Dr. Vinay Chavan| Head and Associate Professor of the Dept. of Computer Science, S.K.Porwal College, Kampat, Nagpur MS, India

Keywords

Related Articles

Boost Interleaved Converter Integrated Voltage Multiplier Module for Renewable Energy System

This document presents a high step-up converter, which is apt for renewable energy system. Through a voltage multiplier unit composed of switched capacitors and coupled inductors, a conventional interleaved boost con...

A New Modular Multilevel Inverter Topology of Reduced Components

Harmonic content of the yield voltage waveform diminishes as the quantity of yield voltage level increments. The primary focal points are lower Total Harmonic Distortion (THD), less weight on the power switches and h...

Privacy Preserving from global eavesdropper in Wireless Sensor Network Using Routing Technique

Various sensor network security schemes care for the content of messages, while the related information is left defenceless by divulge the location of the monitored objects. Preserving location privacy is essential a...

Deduplication Systems Using The Ramp Secret Sharing Scheme

Deduplication systems are ensured as far as the definitions specific in the security display, document level deduplication, which discover redundancies flanked by various records and take these redundancies to declin...

Secrecy Sustain Broadcast Assessment for Collective Information in Cloud Computing

Cloud computing could be a mode of method that shares computing resources considerably than enclose native servers or personal devices to regulate productions. Cloud information storage has varied compensations over...

Download PDF file
  • EP ID EP16216
  • DOI -
  • Views 456
  • Downloads 21

How To Cite

K. Phalguna Rao, Prof. Ashish B. Sasankar, Dr. Vinay Chavan (2013). Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets. International Journal of Science Engineering and Advance Technology, 1(3), 39-44. https://europub.co.uk./articles/-A-16216