Ip Spoofing: Submitted by Sharon Geo Reji S2 Cse
Ip Spoofing: Submitted by Sharon Geo Reji S2 Cse
Ip Spoofing: Submitted by Sharon Geo Reji S2 Cse
SUBMITTED BY
SHARON GEO REJI
S2 CSE
CONTENTS
• What is spoofing
• Types of spoofing
• Ip spoofing
• Ip spoofing attacks
• Prevention of Ip spoofing
• Ip spoofing applications
• Reference
SPOOFING
It is a situation in which one person or program successfully
masquerades as another by falsifying information/data and thereby
gaining an illegitimate advantage.
TYPES OF SPOOFING
• It keeps tracks of the mangled/altered data as it retranslates it when the reply packets are
routed back
CONCLUSION
• https://www.kaspersky.com/resource-center/threats/ip
• https://www.imperva.com/learn/ddos/ip-spoofing/
THANK
YOU