“SPOOFING”……. Headache to IT world.
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 9
Abstract
The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security attack in which one machine on the network masquerades as a different machine. As an active attack, it disrupts the normal flow of data and may involve injecting data into the communications link between other machines. This masquerade aims to fool other machines on the network into accepting the impostor as an original, either to lure the other machines into sending it data or to allow it to alter data. The meaning of “spoof” here is not “a lighthearted parody,” but rather “a deception intended to trick one into accepting as genuine something that is actually false.” Such deception can have grave consequences because notions of trust are central to many networking systems. This paper contains active attack info in the form of “spoofing”, and the way of doing this with avoidance techniques.
Authors and Affiliations
Mr. Shaikh Shaffiq , Miss. Paithankar Kavita , Shinde Monica D
LEARNING BEHAVIOR OF ANALYSIS OF HIGHER STUDIES USING DATA MINING
The main concern of providing higher education is to provide quality education to the students and to produce technically qualified professionals. The knowledge is hidden among the educational data set and it i...
Energy Efficient Geographical Routing Protocol with Location Aware Routing in MANET
A Mobile Ad hoc Network (MANET) is a kind of wireless ad-hoc network, and is a self configuring network of mobile routers (and associated hosts) connected by wireless links the union of which forms an arbitrary t...
750kv Transmission Line parameter and line Efficiency calculation and the performance of High Voltage alternating current Transmission system using MATLAB program
This paper presents the electrical system for 750kv transmission line and also that have been built throughout the world to operate above 700kv.This paper is provides information of system planning, design and programmin...
DISCRIMINATION OF HEART RATE VARIABILITY USING DECISION TREES AND MLP NETWORKS
The main objective of the paper is to analyze the heart rate variability (HRV) of various subjects. The ECG signals collected from the public data base is Categorized using the Classification and Regression Tree...
A Statistical Approach to Classify and Identify DDoS Attacks using UCLA Dataset
Nowadays, Internet is the most well-known and popular thing that is widely used by human beings. It is also an essential part of human life and provides the best and fast communication medium. As many people widely used...