IP Spoofing Attack: Principles, Methods,Tools and Countermeasures

蒋卫华,李伟华,杜君
DOI: https://doi.org/10.3969/j.issn.1000-2758.2002.04.008
2002-01-01
Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University
Abstract:IP (Internet Protocol) spoofing was first introduced in 1985. By IP spoofing and TCP (Transport Control Protocol) sequence number prediction, hackers can gain unauthorized access to remote machines. The existing firewalls and IDS (Intrusion Detection System) cannot solve the problem completely. In this paper, we first introduce the principles, methods, and tools of IP spoofing. Then through the tests on our local area network, we analyze the technical features and approaches of IP spoofing attacks, and provide the countermeasures to reduce the possibility of such attacks, including the configuration of boundary routers, the adoption of encrypted protocols, and the building of intelligent pattern matching strategies. These methods can effectively detect and prevent prevalent IP spoofing attacks.
What problem does this paper attempt to address?