Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2010.010623
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 1 Issue 6, 2010.
Abstract: The main intention of writing this paper is to enable the students, computer users and novice researchers about spoofing attacks. Spoofing means impersonating another person or computer, usually by providing false information (E-mail name, URL or IP address). Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following spoofing attacks in this paper: IP, ARP, E-Mail, Web, and DNS spoofing. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The magnitude of these attacks can be very severe; can cost us millions of dollars. This Paper describes about various spoofing types and gives a small view on detection and prevention of spoofing attacks.
P Ramesh Babu, D.Lalitha Bhaskari and CH.Satyanarayana, “A Comprehensive Analysis of Spoofing ” International Journal of Advanced Computer Science and Applications(IJACSA), 1(6), 2010. http://dx.doi.org/10.14569/IJACSA.2010.010623