IP spoofing is one of the techniques that are widely used on the internet to conceal or falsify the source IP address so that the origin of the packet network can not be tracked or to trick the destination computer.
Ip spoofing analogy is as follows:
Imagine you want to send a threatening letter to someone, and you certainly do not want people who you threaten to know that a threatening letter was from you. So what you do is send a letter with the name and address of another person so that you will be safe and untraceable.
Why do people do IP spoofing?
There are two goals less than both commonly associated with the use of IP spoofing:
1. Submitting a package of garbage in large quantities in order to experience the destination computer overload. Imagine someone sending anonymous letters in the hundreds or even thousands of course this will make you angry that you might throw away all your letters, whereas among the piles of junk mail, there are some important letters.
2. Fool the destination computer so that he would think that the packets sent from the computer that can be trusted. Imagine you received a letter from the village and bearing the Jakarta government, contains notices of new legislation that will be charges a fee for the malaria mosquito spraying by 10 thousand. Of course, if tomorrow somebody comes to collect, there will not be suspicious and give the money, even though that person is a fake officer who had sent a fake letter the day before.
Two things are common scenarios with respect to IP spoofing, but in practice in the IT world, there are various possibilities where IP spoofing techniques can be applied. I hope the concept of IP spoofing can already understand, now let's see in detail, what is happening in the network when the IP spoofing occurs.
Examples of Normal Communication
In normal situations, to communicate in the network each data packet must have a label sender / from / source and destination / to / destination. The figure below shows the normal communication that occurs where the sending computer uses the correct information about himself as the sender, this will facilitate the communication server to answer that ensued.
0 comments:
Post a Comment