Talk With an Expert

Spoofing: An Overview of Some the Current Spoofing Threats

Spoofing: An Overview of Some the Current Spoofing Threats (PDF, 1.61MB)Published: 01 Jul, 2001
Created by
Neil Riser

Spoofing can take on many forms in the computer world, all of which involve some type fraudulent representation of information. There are a variety of methods and types of spoofing. I would like to introduce and explain four in this paper: IP, ARP, Web, and DNS. There are no legal or constructive uses for implementing spoofing of any type. Some of the outcomes might be sport, theft, vindication or some other malicious goal. The gravity of these attacks can be very severe, can cost us millions of dollars and should not be overlooked by the Internet security community