DocumentCode :
3412790
Title :
TCP/IP spoofing fundamentals
Author :
Hastings, Nelson E. ; McLean, Paul A.
Author_Institution :
Dept. of Electr. Eng. & Comput. Eng., Iowa State Univ., Ames, IA, USA
fYear :
1996
fDate :
27-29 Mar 1996
Firstpage :
218
Lastpage :
224
Abstract :
On January 22, 1995, in an article entitled, “New form of attack on computers linked to Internet is uncovered”, John Markoff of the New York Times reported on the TCP/IP protocol suite´s security weakness known as IP spoofing. The IP spoofing security weakness was published by S. M. Bellovin (1989). However, not much attention has been paid to the security weaknesses of the TCP/IP protocol by the general public. This is changing as more people and companies are connecting to the Internet to conduct business. This paper will explore the fundamental weaknesses of the TCP/IP protocol suite used in IP spoofing. A demonstration of exploiting the weaknesses to create unauthorized connections to a network host system is presented by reviewing the software tools developed. This is used to execute an IP spoofing attack. Finally, the paper discusses ways to defend against the IP spoofing attack and their effectiveness
Keywords :
Internet; security of data; transport protocols; Internet; TCP/IP spoofing fundamentals; network host system; protocol; security; software tools; unauthorized connections; Access protocols; Communication networks; Communication system control; Computer networks; Computer security; IP networks; Internet; Joining processes; TCPIP; Transport protocols;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computers and Communications, 1996., Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on
Conference_Location :
Scottsdale, AZ
Print_ISBN :
0-7803-3255-5
Type :
conf
DOI :
10.1109/PCCC.1996.493637
Filename :
493637
Link To Document :
بازگشت