Seminar 3/9/11: IP Spoofing, Kelly Schafbuch

March 9, 2011

Internet protocol spoofing is an internet hacking technique that when used effectively can cripple internet sites. The ability to steal another machines identity and use it as your own is a task that is difficult to perform, but if successful is even harder to detect. In order to understand what happens when an IP spoofing attack occurs, we will first cover the basics of IP structure followed by a quick networking background. We will then be able to examine what steps take place when an IP spoofing attack occurs, and end with ways to prevent this type of attack from happening to you.

Sources: Ali, Farha. “IP Spoofing.” The Internet Protocol Journal, Volume 10, No. 4. Cisco Systems, Inc, Dec. 2007. Web. Feb. 2011.
Fadia, Ankit. “The Art of IP Spoofing.” IP Spoofing. Scribd, 2004. Web. Jan. 2011.
Velasco, Victor. “Introduction to IP Spoofing – GIAC Certified Student Practical.” Information Security Certification – GIAC. Web. Feb. 2011.


Leave a Reply

Your email address will not be published. Required fields are marked *