“SPOOFING”……. Headache to IT world. 

Abstract

The whole world is engaged to provide the complete security to information when it is in network. But the techniques somewhere fail to overcome on attacks. One of them is Spoofing. Spoofing is an active security attack in which one machine on the network masquerades as a different machine. As an active attack, it disrupts the normal flow of data and may involve injecting data into the communications link between other machines. This masquerade aims to fool other machines on the network into accepting the impostor as an original, either to lure the other machines into sending it data or to allow it to alter data. The meaning of “spoof” here is not “a lighthearted parody,” but rather “a deception intended to trick one into accepting as genuine something that is actually false.” Such deception can have grave consequences because notions of trust are central to many networking systems. This paper contains active attack info in the form of “spoofing”, and the way of doing this with avoidance techniques.  

Authors and Affiliations

Mr. Shaikh Shaffiq , Miss. Paithankar Kavita , Shinde Monica D

Keywords

Related Articles

“A Survey on Different Fingerprint Recognition Systems” 

In this paper we are comparing various fingerprint recognition system which are based on minutiae and ridge feature extraction. Here we are comparing various methods using minutiae features only or ridge features o...

A REVIEW ON HAND GETSURE RECOGNITION SYSTEMS

Gesture recognition is a topic in computer science and language technology with the goal of interpreting human gestures via mathematical algorithms. Gestures can originate from any bodily motion or state but commonly...

SECURE MULTICAST COMMUNICATION USING GROUP BASED MULTICAST HIERARCHY  

Secure multicast communication is a significant requirement in emerging applications in adhoc environments like military or public emergency network applications. Membership dynamism is a major challenge in providi...

DESIGN AND PERFORMANCE ANALYSIS OF RING OSCILLATORS

DESIGN AND PERFORMANCE ANALYSIS OF RING OSCILLATORS

TOSCA ENABLING CLOUD PORTABILITY

The cloud is a computing architecture characterized by a large number of interconnected identical computing devices that can scale on demand and that communicate via an IP network. Many technologies commonly associated w...

Download PDF file
  • EP ID EP146620
  • DOI -
  • Views 71
  • Downloads 0

How To Cite

Mr. Shaikh Shaffiq, Miss. Paithankar Kavita, Shinde Monica D (2012). “SPOOFING”……. Headache to IT world. . International Journal of Advanced Research in Computer Engineering & Technology(IJARCET), 1(9), 86-89. https://europub.co.uk/articles/-A-146620