Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications
DOI: 10.1109/pccc.1996.493637
|View full text |Cite
|
Sign up to set email alerts
|

TCP/IP spoofing fundamentals

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 22 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…In a Spoofing attack [52], A sends messages on behalf of another entity. To do so, she sets the IP address in her packets to the address of another device (real or fake).…”
Section: Spoofing Attacksmentioning
confidence: 99%
“…In a Spoofing attack [52], A sends messages on behalf of another entity. To do so, she sets the IP address in her packets to the address of another device (real or fake).…”
Section: Spoofing Attacksmentioning
confidence: 99%
“…Protocols and Specifications Security Attacks Attacks Characteristics/Specifications Application HTTP, FTP, SMTP malware attack [6], FTP bounce [7] internal malicious software, user impersonation Transport TCP, UDP TCP/UDP flooding [8] overload of fake requests and data packets Network IP, ICMP IP spoofing [9] and hijacking [10] falsification and impersonation of IP addresses MAC CSMA, CDMA, OFDMA MAC spoofing [11], network injection [12] falsification of source ID, unauthorized transmissions PHY Transmission Medium, Modulation Eavesdropping [13], jamming [14] unauthorized access to data, transmission interruption cation in IEEE 802.11 networks [16], [17]. Experimental analyses with Wi-Fi signals have proved that a 99% accuracy can be achieved in a system with a few nodes and 85% in largescale applications [18].…”
Section: Osi Layermentioning
confidence: 99%
“…Cybercriminals misuse SMTP to lie recipients about their true identities by not only spoofing one or more headers in the envelope or header of the message that somehow reveals their identity but also put misleading information in these headers. A highly technical spammer or phisher may also evade packet filters and spoof the source IP address of their packets to indicate that the message is from a trusted domain (Hastings et al 1996).…”
Section: Need For E-mail Forensic Investigationmentioning
confidence: 99%