“SPOOFING”……. Headache to IT world. 

Abstract

The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security attack in which one machine on the network masquerades as a different machine. As an active attack, it disrupts the normal flow of data and may involve injecting data into the communications link between other machines. This masquerade aims to fool other machines on the network into accepting the impostor as an original, either to lure the other machines into sending it data or to allow it to alter data. The meaning of “spoof” here is not “a lighthearted parody,” but rather “a deception intended to trick one into accepting as genuine something that is actually false.” Such deception can have grave consequences because notions of trust are central to many networking systems. This paper contains active attack info in the form of “spoofing”, and the way of doing this with avoidance techniques.  

Authors and Affiliations

Mr. Shaikh Shaffiq , Miss. Paithankar Kavita , Shinde Monica D

Keywords

Related Articles

LEARNING BEHAVIOR OF ANALYSIS OF HIGHER STUDIES USING DATA MINING  

The main concern of providing higher education is to provide quality education to the students and to produce technically qualified professionals. The knowledge is hidden among the educational data set and it i...

Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET  

A Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary t...

750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program

This paper presents the electrical system for 750kv transmission line and also that have been built throughout the world to operate above 700kv.This paper is provides information of system planning, design and programmin...

DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS 

The main objective of the paper is to analyze the heart rate variability (HRV) of various subjects. The ECG signals collected from the public data base is Categorized using the Classification and Regression Tree...

A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset

Nowadays, Internet is the most well-known and popular thing that is widely used by human beings. It is also an essential part of human life and provides the best and fast communication medium. As many people widely used...

Download PDF file
  • EP ID EP146620
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

Mr. Shaikh Shaffiq, Miss. Paithankar Kavita, Shinde Monica D (2012). “SPOOFING”……. Headache to IT world. . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(9), 86-89. https://europub.co.uk./articles/-A-146620