ATIS Telecom Glossary
Friday, April 18, 2014

A B C D E F G H I
J K L M N O P Q R
S T U V W X Y Z  
Go
 
Glossary Home
Foreword
Introduction
Normative References
Using the ATIS Telecom Glossary
Annex A: Informative References
 
 
 
<< Back
Internet protocol (IP) spoofing
The creation of IP packets with counterfeit (spoofed) IP source addresses. 2. A method of attack used by network intruders to defeat network security measures such as authentication based on IP addresses. Note 1: An attack using IP spoofing may lead to unauthorized user access, and possibly root access, on the targeted system. Note 2: A packet-filtering-router firewall may not provide adequate protection against IP spoofing attacks. It is possible to route packets through this type of firewall if the router is not configured to filter incoming packets having source addresses on the local domain. Note 3: IP spoofing is possible even if no reply packets can reach the attacker. Note 4: A method for preventing IP spoofing problems is to install a filtering router that does not allow incoming packets to have a source address different from the local domain. In addition, outgoing packets should not be allowed to contain a source address different from the local domain, in order to prevent an IP spoofing attack from originating from the local network.

 

 

 

 

 

 

 

 

 

 



 
These definitions were prepared by ATIS Committee PRQC
 
For more information on the work related to these definitions,
please visit the ATIS website and the ATIS Document Center