As technology sweeps across the globe, connecting people and organisations at a level never experienced before, so have the cybercriminals got more potential victims under their predatory gaze. In this article, we are going to look into ‘IP spoofing<\/a>’, one of the methods employed by these bad actors and how it can be countered.

IP Spoofing is a trick used by
cyber criminals<\/a> to create and send Internet<\/a> Protocol (IP) packets, (used for communicating with other computer systems) to either hide their identity or confuse the origin of the system to target a website or organisation with a cyberattack. IP Spoofing is generally used to orchestrate DDoS<\/a> cyberattacks about which we have explained earlier in one of our articles. In IP Spoofing, the IP packets, which contain routing information, including the source address, are given a different origin or source address to mask the real system, hence the terminology.

Think of it like getting unwanted calls at home with a new, unknown number. If you want to stop getting the calls, how do you do that? You block that number. But since the number is fake (hypothetically), you will get another call from a different number, which is also fake. You block that, a new call comes with a third unknown number, while you cannot decipher the original number from which the calls are being made. In layman’s terms, this is the principle of IP Spoofing. In order to get such calls, there should be a provision, a filter, which is able to check for such calls and block them automatically. We will talk about this later in the article.

With a false source IP address, which keeps changing continuously, blocking the malicious requests will not do the trick. IP Spoofing is also used to mask the true identity of the sender and masquerade as someone else, to gain access to another device.

So, how do cybersecurity experts deal with such a threat? By using a technique called
Ingress Filtering<\/a>, which is a type of packet filtering. It is implemented on a network edge device, which monitors incoming IP packets and checks the source headers of all of them as they come. The source headers that do not match the actual source headers or look suspicious, are rejected.

Another way Ingress Filtering is employed is by checking the source headers while the IP packets are leaving the network. This is usually done to prevent someone within the network from launching an IP Spoofing-based cyber attack.

<\/p><\/body>","next_sibling":[{"msid":89814714,"title":"From Nagpur to New York, SMBs get the same level of security coverage: Microsoft India\u2019s Vellat","entity_type":"ARTICLE","link":"\/news\/from-nagpur-to-new-york-smbs-get-the-same-level-of-security-coverage-microsoft-indias-vellat\/89814714","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"89780372","title":"cyber-crime","entity_type":"IMAGES","seopath":"gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime","category_name":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-66862\/89780372.cms?width=150&height=112","link":"\/image\/gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime\/89780372"}],"seoschemas":false,"msid":89814830,"entity_type":"ARTICLE","title":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":"In this article, we are going to look into \u2018IP spoofing\u2019, one of the methods employed by these bad actors and how it can be countered.","titleseo":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"TIMESOFINDIA.COM","artdate":"2022-02-25 07:47:29","lastupd":"2022-02-25 07:47:52","breadcrumbTags":["ip spoofing","ingress filtering","ddos","ddos cyberattack","cyber crime","cyber criminals","Internet"],"secinfo":{"seolocation":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2022-02-25" data-index="article_1">

解释:什么是IP欺骗和网络专家如何处理它

在本文中,我们将研究“IP欺骗”,这些糟糕的演员使用的方法之一,它可以反击。

  • 更新于2022年2月25日07:47点坚持

当技术席卷全球,连接人们和组织水平之前从未经历过,所以有网络罪犯有更多潜在受害者掠夺性的目光。在本文中,我们要考虑的IP欺骗”,这些糟糕的演员使用的方法之一,它可以反击。

IP欺骗所使用的技巧网络罪犯创建和发送互联网协议(IP)包,(用于与其他计算机系统)来隐藏他们的身份或混淆的起源系统与网络攻击目标网站或组织。IP欺骗通常用于编排分布式拒绝服务网络攻击的早些时候我们解释我们的文章之一。在IP欺骗,IP数据包,包含路由信息,包括源地址,给出不同的起源或源地址掩盖真实的系统,因此术语。

广告
把它想象成不必要的电话在家里用一个新的,未知的号码。如果你想要停止的电话,你怎么做?你块号码。但由于数量是假的(假设),你会得到另一个电话从一个不同的数字,也是假的。你块,一个新的电话与第三未知号码,当你无法破译的原始编号调用。通俗的说,这是IP欺骗的原则。为了得到这样的呼吁,应该有一个规定,一个过滤器,它能够自动检查这样的呼吁,并阻止他们。我们将在本文后面讨论这个。

与一个错误的源IP地址,它在不断变化不断,阻断恶意请求不会奏效。IP欺骗也用来掩盖真实身份的发送者和冒充别人,获得另一个设备。

因此,网络安全专家如何处理这种威胁?通过使用技术入口过滤,这是一个类型的信息包过滤。实现在网络边缘设备,显示器输入IP数据包,检查源头的他们。源标题不匹配实际的源标题或可疑,被拒绝。

广告
入口过滤采用另一种方式是通过检查源IP数据包离开网络时头。这样做通常是为了防止有人在网络中推出一个IP Spoofing-based网络攻击。

  • 发布于2022年2月25日07:47点坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序

As technology sweeps across the globe, connecting people and organisations at a level never experienced before, so have the cybercriminals got more potential victims under their predatory gaze. In this article, we are going to look into ‘IP spoofing<\/a>’, one of the methods employed by these bad actors and how it can be countered.

IP Spoofing is a trick used by
cyber criminals<\/a> to create and send Internet<\/a> Protocol (IP) packets, (used for communicating with other computer systems) to either hide their identity or confuse the origin of the system to target a website or organisation with a cyberattack. IP Spoofing is generally used to orchestrate DDoS<\/a> cyberattacks about which we have explained earlier in one of our articles. In IP Spoofing, the IP packets, which contain routing information, including the source address, are given a different origin or source address to mask the real system, hence the terminology.

Think of it like getting unwanted calls at home with a new, unknown number. If you want to stop getting the calls, how do you do that? You block that number. But since the number is fake (hypothetically), you will get another call from a different number, which is also fake. You block that, a new call comes with a third unknown number, while you cannot decipher the original number from which the calls are being made. In layman’s terms, this is the principle of IP Spoofing. In order to get such calls, there should be a provision, a filter, which is able to check for such calls and block them automatically. We will talk about this later in the article.

With a false source IP address, which keeps changing continuously, blocking the malicious requests will not do the trick. IP Spoofing is also used to mask the true identity of the sender and masquerade as someone else, to gain access to another device.

So, how do cybersecurity experts deal with such a threat? By using a technique called
Ingress Filtering<\/a>, which is a type of packet filtering. It is implemented on a network edge device, which monitors incoming IP packets and checks the source headers of all of them as they come. The source headers that do not match the actual source headers or look suspicious, are rejected.

Another way Ingress Filtering is employed is by checking the source headers while the IP packets are leaving the network. This is usually done to prevent someone within the network from launching an IP Spoofing-based cyber attack.

<\/p><\/body>","next_sibling":[{"msid":89814714,"title":"From Nagpur to New York, SMBs get the same level of security coverage: Microsoft India\u2019s Vellat","entity_type":"ARTICLE","link":"\/news\/from-nagpur-to-new-york-smbs-get-the-same-level-of-security-coverage-microsoft-indias-vellat\/89814714","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[{"msid":"89780372","title":"cyber-crime","entity_type":"IMAGES","seopath":"gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime","category_name":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":false,"thumb":"https:\/\/etimg.etb2bimg.com\/thumb\/img-size-66862\/89780372.cms?width=150&height=112","link":"\/image\/gadgets-news\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it\/cyber-crime\/89780372"}],"seoschemas":false,"msid":89814830,"entity_type":"ARTICLE","title":"Explained: What is IP spoofing and how cyber experts deal with it","synopsis":"In this article, we are going to look into \u2018IP spoofing\u2019, one of the methods employed by these bad actors and how it can be countered.","titleseo":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it","status":"ACTIVE","authors":[],"Alttitle":{"minfo":""},"artag":"TIMESOFINDIA.COM","artdate":"2022-02-25 07:47:29","lastupd":"2022-02-25 07:47:52","breadcrumbTags":["ip spoofing","ingress filtering","ddos","ddos cyberattack","cyber crime","cyber criminals","Internet"],"secinfo":{"seolocation":"telecomnews\/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it"}}" data-news_link="//www.iser-br.com/news/explained-what-is-ip-spoofing-and-how-cyber-experts-deal-with-it/89814830">