Professional Documents
Culture Documents
IP Spoofing
IP Spoofing
Volume 4 Issue 6, September-October 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
IP Spoofing
Mr. Satish Bharadwaj1, Prof. Abhijit Desai2
1Student, 2Asistant
Professor,
1,2Bharati Vidyapeeth’s Institute of Management and Information Technology, Navi Mumbai, Maharashtra, India
@ IJTSRD | Unique Paper ID – IJTSRD33246 | Volume – 4 | Issue – 6 | September-October 2020 Page 663
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
than rectifying the mistakes done. The Intrusion IV. Advantages
Detection System is utilized for the prevention of attack done “A coin has two sides”, hence there is also advantage in using
on the system. of ip address spoofing. The use of it is majorly done on large
accounts in a corporate sector basically to test their system
To avoid such attacks majorly the implementation of packet or network
filtering is done. Few methods is listed below.
Many organizations approaches company to grant their
Ingress filtering employees (virtual users) to test their network with
Ingress filtering is a method that assures the incoming different ip address by spoofing the source network. This
packets are from the intended network, from which the method indicates that, if volume of end users visits their
communication is done and not from any other network network, how would it perform.
which pretend to be.
So, the network can be improved on the basis of the result.
It is used to prevent the companies or a corporate network Sometimes, the most number of visitors at the same time can
from unwanted spoofing traffic. crash the network.
@ IJTSRD | Unique Paper ID – IJTSRD33246 | Volume – 4 | Issue – 6 | September-October 2020 Page 664