Professional Documents
Culture Documents
Synopsis
Synopsis
Bachelor of Technology
DEPARTMENT OF INFORMATION TECHNOLOGY FINAL YEAR HMR INSTITUTE OF TECHNOLOGY & MANAGEMENT HAMIDPUR, DELHI -110036.
OBJECTIVE
IP spoofing is a method of attacking a network in order to gain unauthorized access. It is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by spoofing the IP address of that machine.
SCOPE
To get information about IP Spoofing and examine the concepts of IP spoofing. Ie. why it is possible, how it works, what it is used for how to defend against it.
www.redbooks.ibm.com
www.yale.edu/pclt/COMM/TCPIP.HTM
INTRODUCTION TO IP SPOOFING
www.sans.org/reading_room/whitepapers/.../introduction-ipspoofing_959 www.linuxsecurity.com/content/view/120225/ www.giac.org/practical/gsec/victor_velasco_gsec.pdf www.cisco.com/web/about/ac123/ac147/.../ipj.../104_ipspoofing.html
2. 3. 4.