As technology sweeps across the globe, connecting people and organisations at a level never experienced before, so have the cybercriminals got more potential victims under their predatory gaze. In this article, we are going to look into ‘IP spoofing<\/a>’, one of the methods employed by these bad actors and how it can be countered. 当技术席卷全球,连接人们和组织水平之前从未经历过,所以有网络罪犯有更多潜在受害者掠夺性的目光。在本文中,我们要考虑的IP欺骗”,这些糟糕的演员使用的方法之一,它可以反击。
IP Spoofing is a trick used by cyber criminals<\/a> to create and send Internet<\/a> Protocol (IP) packets, (used for communicating with other computer systems) to either hide their identity or confuse the origin of the system to target a website or organisation with a cyberattack. IP Spoofing is generally used to orchestrate DDoS<\/a> cyberattacks about which we have explained earlier in one of our articles. In IP Spoofing, the IP packets, which contain routing information, including the source address, are given a different origin or source address to mask the real system, hence the terminology.
Think of it like getting unwanted calls at home with a new, unknown number. If you want to stop getting the calls, how do you do that? You block that number. But since the number is fake (hypothetically), you will get another call from a different number, which is also fake. You block that, a new call comes with a third unknown number, while you cannot decipher the original number from which the calls are being made. In layman’s terms, this is the principle of IP Spoofing. In order to get such calls, there should be a provision, a filter, which is able to check for such calls and block them automatically. We will talk about this later in the article.
With a false source IP address, which keeps changing continuously, blocking the malicious requests will not do the trick. IP Spoofing is also used to mask the true identity of the sender and masquerade as someone else, to gain access to another device.
So, how do cybersecurity experts deal with such a threat? By using a technique called Ingress Filtering<\/a>, which is a type of packet filtering. It is implemented on a network edge device, which monitors incoming IP packets and checks the source headers of all of them as they come. The source headers that do not match the actual source headers or look suspicious, are rejected.
Another way Ingress Filtering is employed is by checking the source headers while the IP packets are leaving the network. This is usually done to prevent someone within the network from launching an IP Spoofing-based cyber attack.
<\/p><\/body>","next_sibling":[{"msid":89814714,"title":"From Nagpur to New York, SMBs get the same level of security coverage: Microsoft India\u2019s Vellat","entity_type":"ARTICLE","link":"\/news\/from-nagpur-to-new-york-smbs-get-the-same-level-of-security-coverage-microsoft-indias-vellat\/89814714","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"89780372","title":"cyber-crime","entity_type":"IMAGES","seopath":"gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime","category_name":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-66862\/89780372.cms?width=150&height=112","link":"\/image\/gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime\/89780372"}],"seoschemas":false,"msid":89814830,"entity_type":"ARTICLE","title":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":"In this article, we are going to look into \u2018IP spoofing\u2019, one of the methods employed by these bad actors and how it can be countered.","titleseo":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"TIMESOFINDIA.COM","artdate":"2022-02-25 07:47:29","lastupd":"2022-02-25 07:47:52","breadcrumbTags":["ip spoofing","ingress filtering","ddos","ddos cyberattack","cyber crime","cyber criminals","Internet"],"secinfo":{"seolocation":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2022-02-25" data-index="article_1">
IP欺骗所使用的技巧网络罪犯创建和发送互联网协议(IP)包,(用于与其他计算机系统)来隐藏他们的身份或混淆的起源系统与网络攻击目标网站或组织。IP欺骗通常用于编排分布式拒绝服务网络攻击的早些时候我们解释我们的文章之一。在IP欺骗,IP数据包,包含路由信息,包括源地址,给出不同的起源或源地址掩盖真实的系统,因此术语。
与一个错误的源IP地址,它在不断变化不断,阻断恶意请求不会奏效。IP欺骗也用来掩盖真实身份的发送者和冒充别人,获得另一个设备。
因此,网络安全专家如何处理这种威胁?通过使用技术入口过滤,这是一个类型的信息包过滤。实现在网络边缘设备,显示器输入IP数据包,检查源头的他们。源标题不匹配实际的源标题或可疑,被拒绝。
入口过滤采用另一种方式是通过检查源IP数据包离开网络时头。这样做通常是为了防止有人在网络中推出一个IP Spoofing-based网络攻击。
As technology sweeps across the globe, connecting people and organisations at a level never experienced before, so have the cybercriminals got more potential victims under their predatory gaze. In this article, we are going to look into ‘IP spoofing<\/a>’, one of the methods employed by these bad actors and how it can be countered.
IP Spoofing is a trick used by cyber criminals<\/a> to create and send Internet<\/a> Protocol (IP) packets, (used for communicating with other computer systems) to either hide their identity or confuse the origin of the system to target a website or organisation with a cyberattack. IP Spoofing is generally used to orchestrate DDoS<\/a> cyberattacks about which we have explained earlier in one of our articles. In IP Spoofing, the IP packets, which contain routing information, including the source address, are given a different origin or source address to mask the real system, hence the terminology.
Think of it like getting unwanted calls at home with a new, unknown number. If you want to stop getting the calls, how do you do that? You block that number. But since the number is fake (hypothetically), you will get another call from a different number, which is also fake. You block that, a new call comes with a third unknown number, while you cannot decipher the original number from which the calls are being made. In layman’s terms, this is the principle of IP Spoofing. In order to get such calls, there should be a provision, a filter, which is able to check for such calls and block them automatically. We will talk about this later in the article.
With a false source IP address, which keeps changing continuously, blocking the malicious requests will not do the trick. IP Spoofing is also used to mask the true identity of the sender and masquerade as someone else, to gain access to another device.
So, how do cybersecurity experts deal with such a threat? By using a technique called Ingress Filtering<\/a>, which is a type of packet filtering. It is implemented on a network edge device, which monitors incoming IP packets and checks the source headers of all of them as they come. The source headers that do not match the actual source headers or look suspicious, are rejected.
Another way Ingress Filtering is employed is by checking the source headers while the IP packets are leaving the network. This is usually done to prevent someone within the network from launching an IP Spoofing-based cyber attack.
<\/p><\/body>","next_sibling":[{"msid":89814714,"title":"From Nagpur to New York, SMBs get the same level of security coverage: Microsoft India\u2019s Vellat","entity_type":"ARTICLE","link":"\/news\/from-nagpur-to-new-york-smbs-get-the-same-level-of-security-coverage-microsoft-indias-vellat\/89814714","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"89780372","title":"cyber-crime","entity_type":"IMAGES","seopath":"gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime","category_name":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-66862\/89780372.cms?width=150&height=112","link":"\/image\/gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime\/89780372"}],"seoschemas":false,"msid":89814830,"entity_type":"ARTICLE","title":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":"In this article, we are going to look into \u2018IP spoofing\u2019, one of the methods employed by these bad actors and how it can be countered.","titleseo":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"TIMESOFINDIA.COM","artdate":"2022-02-25 07:47:29","lastupd":"2022-02-25 07:47:52","breadcrumbTags":["ip spoofing","ingress filtering","ddos","ddos cyberattack","cyber crime","cyber criminals","Internet"],"secinfo":{"seolocation":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it"}}" data-news_link="//www.iser-br.com/news/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it/89814830">
评论
现在评论 阅读评论(1)所有评论
找到这个评论进攻?
下面选择你的理由并单击submit按钮。这将提醒我们的版主采取行动