A Comprehensive Analysis of Spoofing
This article gives an in-depth explanation of internet protocol (IP) and email address spoofing. What are the steps for IP spoofing? Why might an attacker would want to spoof an IP or email address?
1. Introduction
Spoofing can take on many forms in the computer world, all of which involve some type false representation of information. There are a variety of methods and types of spoofing. We would like to introduce and explain following types in this paper:
- IP Spoofing
- ARP Spoofing
- E-Mail Spoofing
- Web Spoofing
- DNS Spoofing
Source: P. Ramesh Babu, Lalitha Bhaskari, and C. H. Satyanarayana, https://thesai.org/Publications/ViewPaper?Volume=1&Issue=6&Code=IJACSA&SerialNo=23
This work is licensed under a Creative Commons Attribution 4.0 License.