Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Spoofing Attack

Handbook of Research on Wireless Security
Spoofing attack involves the creation of packets with a forged or faked source IP addresses.
Published in Chapter:
Vulnerability Analysis and Defenses in Wireless Networks
Lawan A. Mohammed (King Fahd University of Petroleum and Minerals, Saudi Arabia) and Biju Issac (Swinburne University of Technology – Sarawak Campus, Malaysia)
Copyright: © 2008 |Pages: 16
DOI: 10.4018/978-1-59904-899-4.ch010
Abstract
This chapter shows that the security challenges posed by the 802.11 wireless networks are manifold and it is therefore important to explore the various vulnerabilities that are present with such networks. Along with other security vulnerabilities, defense against denial of service attacks is a critical component of any security system. Unlike wired networks where denial of service attacks has been extensively studied, there is a lack of research for preventing such attacks in wireless networks. In addition to various vulnerabilities, some factors leading to different types of denial of service (DoS) attacks and some defense mechanisms are discussed in this chapter. This can help to better understand the wireless network vulnerabilities and subsequently more techniques and procedures to combat these attacks may be developed by researchers.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Biometric Template Security and Biometric Encryption Using Fuzzy Frameworks
Attack mechanism where a persons or program successfully masquerades as another, thereby obtaining illegal access authority.
Full Text Chapter Download: US $37.50 Add to Cart
Voice Liveness Detection for Medical Devices
An attacker presents a counterfeit biometric evidence of a target user to outwit the biometric system. In the context of this chapter, spoofing attack implies an attacker presents a recorded, converted, or synthesized speech sample in order to outwit the speaker verification system to accept the attacker as a claimed identity.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR