The main intention of writing this paper is to enable the students, computer users and novice researchers about spoofing attacks. Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following spoofing attacks in this paper: IP, ARP, E-Mail, Web, and DNS spoofing. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The magnitude of these attacks can be very severe; can cost us millions of dollars. This Paper describes about various spoofing types and gives a small view on detection and prevention of spoofing attacks.
%0 Journal Article
%1 IJACSA.2010.010623
%A P Ramesh Babu D.Lalitha Bhaskari, CH.Satyanarayana
%D 2010
%J International Journal of Advanced Computer Science and Applications(IJACSA)
%K Attacks, Filtering, Information, Trust,Spoofing
%N 6
%T A Comprehensive Analysis of Spoofing
%U http://ijacsa.thesai.org/
%V 1
%X The main intention of writing this paper is to enable the students, computer users and novice researchers about spoofing attacks. Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following spoofing attacks in this paper: IP, ARP, E-Mail, Web, and DNS spoofing. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The magnitude of these attacks can be very severe; can cost us millions of dollars. This Paper describes about various spoofing types and gives a small view on detection and prevention of spoofing attacks.
@article{IJACSA.2010.010623,
abstract = {The main intention of writing this paper is to enable the students, computer users and novice researchers about spoofing attacks. Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following spoofing attacks in this paper: IP, ARP, E-Mail, Web, and DNS spoofing. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The magnitude of these attacks can be very severe; can cost us millions of dollars. This Paper describes about various spoofing types and gives a small view on detection and prevention of spoofing attacks.
},
added-at = {2014-02-21T08:00:08.000+0100},
author = {{P Ramesh Babu D.Lalitha Bhaskari}, CH.Satyanarayana},
biburl = {https://www.bibsonomy.org/bibtex/23121f2e5da38561d2b17c412e2a2d01c/thesaiorg},
interhash = {90ce6427db64915827cb6ae3205ab391},
intrahash = {3121f2e5da38561d2b17c412e2a2d01c},
journal = {International Journal of Advanced Computer Science and Applications(IJACSA)},
keywords = {Attacks, Filtering, Information, Trust,Spoofing},
number = 6,
timestamp = {2014-02-21T08:00:08.000+0100},
title = {{A Comprehensive Analysis of Spoofing}},
url = {http://ijacsa.thesai.org/},
volume = 1,
year = 2010
}