3 research outputs found

    Spoofing Attacks on Packets And Methods For Detection And Prevention Of Spoofed Packets

    Get PDF
    In a spoofing attack, the attacker creates misleading context in order to trick the victim into making an inappropriate security-relevant decision.  A spoofing attack is like a con game: the attacker sets up a false but convincing world around the victim.  The victim does something that would be appropriate if the false world were real.  Unfortunately, activities that seem reasonable in the false world may have disastrous effects in the real world. Spoofing attacks are possible in the physical world as well as the electronic one.  For example, there have been several incidents in which criminals set up bogus automated-teller machines (ATM), typically in the public areas of shopping malls.   The machines would accept ATM cards and ask the person to enter their PIN code.  Once the machine had the victim’s PIN, it could either eat the card or “malfunction” and return the card.  In either case, the criminals had enough information to copy the victim’s card and use the duplicate.  In these attacks, people were fooled by the context they saw: the location of the machines, their size and weight, the way they were decorated, and the appearance of their electronic displays. In this Research we discus spoofing attacks and detection methods of spoofing attacks
    corecore