Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 2

SYNOPSIS ON DNA BASED COMPUTING

SUBMITTED BY SWATI RAJ Roll no. - 1081333108 SUBMITTED TO MR. IZHAR

for the award of the degree of

Bachelor of Technology

DEPARTMENT OF INFORMATION TECHNOLOGY FINAL YEAR HMR INSTITUTE OF TECHNOLOGY & MANAGEMENT HAMIDPUR, DELHI -110036.

OBJECTIVE
IP spoofing is a method of attacking a network in order to gain unauthorized access. It is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by spoofing the IP address of that machine.

SCOPE
To get information about IP Spoofing and examine the concepts of IP spoofing. Ie. why it is possible, how it works, what it is used for how to defend against it.

REFERENCES TCP/IP SUITE


1. 2. 1.

www.redbooks.ibm.com
www.yale.edu/pclt/COMM/TCPIP.HTM

INTRODUCTION TO IP SPOOFING
www.sans.org/reading_room/whitepapers/.../introduction-ipspoofing_959 www.linuxsecurity.com/content/view/120225/ www.giac.org/practical/gsec/victor_velasco_gsec.pdf www.cisco.com/web/about/ac123/ac147/.../ipj.../104_ipspoofing.html

2. 3. 4.

You might also like