Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

TECHNICAL SEMINAR ON

IP SPOOFING
presented by
M.SUKANYA

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING


JNTUA COLLEGE OF ENGINEERING KALIKIRI-517234
Content
 Introduction
 What is IP Spoofing
 Why IP spoofing is easy
 How IP Spoofing Works
 IP Spoofing Usaging
 History
 Applications
 Spoofing Attacks
 Stopping IP spoofing attacks
 Advantages
 Disadvantages
 Future Scope
 Conclusion
Introduction

 IP Spoofing is one of the most common forms of on-


line camouflage.

 IP Spoofing gains an unauthorized access over a


network.
IP SPOOFING
What is IP Spoofing

 An IP (Internet Protocol) address is the address that


reveals the identity of your Internet service provider
and your personal Internet connection.

 IP Spoofing hides the IP address by creating IP packets


with bogus IP addresses.
Why IP Spoofing Is easy

 IP routing is hop by hop.

 Routers look at destination addresses only.

 Authentication based on Source addresses only.


How IP Spoofing Works

 The Internet Protocol or IP is used for sending and receiving


data over the network.

 Each packet of information that is sent is identified by the IP


address.

 If you try to respond to the information, it will be sent to a


bogus IP address.
Why IP Spoofing is Used

 Hackers use IP spoofing so they do not get caught

spamming and to perpetrate denial of service attacks.

 IP Spoofing eliminates the need to provide a user name

and password to log onto the network.


Brief History of IP Spoofing

 The concept of IP spoofing was initially discussed in


academic circles in the 1980's.

 In the April 1989 article entitled: “Security Problems


in the TCP/Protocol Suite”, author S. M Bellovin of
AT & T Bell labs was among the first to identify IP
spoofing as a real risk to computer networks.
Applications of IP spoofing

 Many other attacks rely on IP spoofing mechanism,

for example SMURF attack (also known as ICMP

flooding).

 Denial of service (DoS) attacks uses IP Spoofing

mechanism.
Spoofing Attacks
 Non-Blind Spoofing

 Blind Spoofing

 Man in the Middle Attack

 Denial of Service Attack


Stopping IP Spoofing Attack

 Packet filtering

 Compression

 Cryptography

 Software to stop IP Spoofing


Advantages

 Multiple Servers : Sometimes you want to change where

packets heading into your network will go.

 Transparent Proxying : Sometimes you want to pretend that

each packet which passes through your Linux box is destined

for a program on the Linux box itself.


Disadvantages

 Blind to Replies: A drawback to IP source address spoofing is

that reply packet will go back to the spoofed IP address rather

than to the attacker.

 Serial attack platforms: However, the attacker can still maintain

anonymity by taking over a chain of attack hosts.


Conclusion

 IP spoofing is less of a threat today due to the patches to the Unix

Operating system and the widespread use of random sequence

numbering.

 Security professionals are predicting a shift from IP Spoofing to

application related spoofing.


References
 Internet Vulnerabilities Related to TCP/IP and T/TCP, ACM SIGCOMM,
Computer Communication Review

 Distributed System: Concepts and Design, Chapter 7, by Coulouris,


Dollimore, and Kindberg

 An Algebraic Approach to IP Trace-back, ACM Transactions on


Information and System Security, Vol. 5, No. 2, May 2002

 Network support for IP trace-back, IEEE/ACM Transactions on


Networking, Vol. 9, No. 3, June 2001
Thanks….

You might also like